0% found this document useful (0 votes)
214 views

Tong Hop Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
214 views

Tong Hop Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

1.

A(n)___ list is also known as a queue (choose 1)


A. LiFO
B.FIFO
C. unordered
D. ordered

2.If the exponent in Excess_127 is binary 10000101=133, the exponent in decimal is


A. 6(133-127)
B. 7
C. 8
D. 9

3. Off-line operation is the operation of devices without the control of


A. Memory
B. CPU
C. ALU
D. Control unit
E. None of the above

4. Personnel who design, program, operate and maintain computer equipment refers to
A. Console-operator
B. Programmer
C. Peopleware
D. System Analyst
E. None of the above

5. In two’s complement representation with a 4-bit allocation, we get__ when we add 5 to


5 (5 = 0101, bù 1 = 1010, bù 2 (=bù 1 + 1) = 1011 = -3)
A. -5
B. -6
C. -7
D. 10

6. The operation that takes two relations and combines them based on common
attributes is the operation
A. join
B. project
C. union
D. intersection

7.___ is a program that facilitates the execution of other programs.


A. An operating system
B. Hardware
C. A queue
D. An application program

8. In the___ graphic method of representing an image in a computer, the image is


decomposed into a combination of geometrical figures.
A. Bitmap
B.vector
C.quantized
D.binary
9.In an Excess conversion, we __ the number to be converted.
A. add the bias number to
B. subtract the bias number from
C. multiply the bias number by
D. divide the bias number by

10.To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then___ the
bit pattern and the mask.
A. AND
B. OR
C. XOR
D. NOT

11. A generalised software package produced to meet the bugs of a variety of data
processing users is known as
A. Utility programs
B. System software
C. Operating system
D. Application package
E.None of the above

12. Each element in a record is called


A. a variable
B. an index
C a field
D a node

13. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilitarianism
C. social contract
D. none of the above

14. What is the domain name in the email address kayla@naso.gov?


A. kayla
B. kayla@nasa.gov
C. nasa.gov
D. gov

15. Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B Microcomputers
C Mainframe computers
D. Supercomputers
E. None of the above

16. The pop operation ___ of the stack.


A. deletes an item from the top
B. deleted an item from the bottom
C. inserts an item at the top
D. inserts an item at the bottom
17. A___ is simply an arrangement where multiple disk drives appear as a single disk
drive to the user
A. disk
B. disk array
C. bunch of disks
D. disk pack
E. spanned drive

18. A stack is a ___ structure.


A. FIFO
B. LIFO
C. DIFO
D. SIFO

19. A notation used to express clearly on algorithm is known as


A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the above

20. The unary___ operator invest its single input.


A. AND
B. OR
C. NOT
D. XOR

21. When a sequential file is updated, the ___ file contains a list of all errors occurring
during the update process
A. new master
B. old master
C. transaction
D. error report

22.______ means concealing the contents of a message by enciphering


A. Steganography
B. Cryptography
C. compressing
D. Authentication

23. The no of logical records in a physical record is


A. Group
B. Blocking factor
C Sector
D Field
E None of the above

24. If the transaction file key is 20 with a delete code and the master file key is 20, then
we___
A. add the transaction to the new master file
B. revise the contents of the old master file
C. delete the data
D. write the old master file record to the new master life

25. An empty linked list consists of __


A. a node
B. two nodes
C. data and a link
D. a null head pointer

26.___ is a declarative language used on relational databases.


A. PDQ
B SQL
C LES
D PBJ

27 Which of the following is the expansion of EBCDIC


A Extended bit comparable to digital interface for computer
B Extended bootable computerised digital infrared calculator
C Extended binary coded decimal interchange code
D Extended binary coded decimal information code
E None of the above

28 After a sequential file is updated, the___ file contains the most current data
A new master
B old master
C transaction
D error report

29 Each row in a relation is called ___


A an attribute
B a tuple
C a union
D an attitude

30. ___ means that the sender and the receiver expect confidentiality
A Non Repudiation
B integrity
C Authentication
D encryption and decryption

31. A hybrid computer used a ___ to convert digital signals from a computer into analog
signals
A. Modulator
B Demodulator
C Modem
D Decoder
E None of the above

32. In___ , the program can be divided into differently sized sections
A. partitioning
B paging
C demand paging
D demand segmentation

33 A byte consists of __ bits


A2
B4
C8
D 16

34 We use a ___ search for an unordered list


A sequential
B binary
C bubble
D insertion

35 Testing a software system can involve ___ testing


A black-box
B glass-box
C neither black-box nor glass-box
D both black-box and glass-box
36. _____ is an ordered collection of data in which each element contains the location of the
next element.

a. An array

b. A record

c. A linked list

d. A file

37. When a sequential file is updated, the ________ file gets the actual update.
a. New master
b. Old master
c. the transaction
d. the error report

38. The _______ manager is responsible for access to I/O devices.


a. memory
b. process
c. device
d. file

39. The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.
a. Unsigned
b. Sign-and-magnitude
c. two’s complement
d. one’s complement

40. The most important advantage of a video disk is


a. Compactness
b. Potential Capacity
c. Durability
d. Cost effectiveness
e. None of above

41. The first electronic special-purpose computer was called _______.


a. Pascal
b. Pascaline
c. ABC (Atanasoff–Berry computer)
d. ENIAC

42. In the system development process, writing the program is part of the _______ phase.
a. Analysis
b. Implementation
c. design
d. testing

43. ________ is a protocol for file transfer.


a. FTP
b. SMTP
c. HTTP
d. All of the above

44. A data item which is not broken into smaller units is _____
a. Data element
b. Elementary data item
c. Data entry
d. Database management
e. None of above

46. A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).
a. one, one
b. one, two
c. two, one
d. two, two

47. The ________ construct uses a set of actions one after another.
a. Sequence
b. Decision
c. repetition
d. flow

48. In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU
b. input/output
c. memory
d. control unit

49. If A is the first data element input into a stack, followed by B, C, and D, then ________ is the
first element to be removed.
a. A
b. B
c. C
d. D

50. An indexed file consists of_____


a. only a sequential data file
b. only an index
c. only a random data file
d. an index and random data file

51. a _____ controller is a high-speed serial interface that transfers data in packets.
a. SCSI
b. USB
c. FireWire
d. USB and FireWire

52. a type of channel used to connect a central processor and peripherals which uses
multiplying is known as
a. Modern
b. Network
c. Multiplexer
d. All of the above

e. None of the above

53. time during which a job is processed by the computer is


a. Delay time
b. Real time
c. Execution time
d. Down time
e. None of the above

54. The most common binary code in use today is the 8 bit ASCII code. What do the letters
ASCII stand for?
a. American Standard Code for International Interchange
b. American Standard Code for Information Interchange
c. American Standard Code for Intelligence Interchange
d. American Scientific Code for Information Interchange
e. None of the above

55. IP addresses are currently _______ bits in length.


a. 4
b. 8
c. 32
d. 40

56. A data structure can be _______.

a. only an array
b. only a record
c. only a linked list
d. an array, a record, or a linked list

57. Third generation computer


a. were the first to use integrated circuitry

b. were the first to use built-in error detecting devices

c. used transistors instead of vaccum tubes

d. All of the above

e. None of the above

58. In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures

a. bitmap

b. vector

c. quantized

d. Binary

59. Of the various database models, the ______ model is the most prevalent today.

a. hierarchical

b. network

c. relational

d. linked list

60. A storage system for small amounts of data is

a. Magnetic card

b. Magnetic tape

c. Punched card

d. Optical mark reader

e. None of the above

61. In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.

a. selection

b. bubble

c. insertion

d. None of the above


62. main storage is also called

a. Accumulator

b. Control unit

c. Register unit

d. Memory

e. None of the others

63. The base of the octal system is ____

a. 2

b. 8

c. 10

d. 16

64. Which of the following representations is erroneous?

a. (110)2

b. (141)8

c. (EF)16

d. 22A

65. Information about a product is that is kept secret by the owner is referred to as a ______

a. trade mark

b. trade secret

c. patent

d. Copyright

66. _______ is a set of instructions in a computer language that tells the computer what to do
with data.

a. An operating system

b. An algorithm

c. A data processor
d. A program

67. The ____ manager is responsible for archiving and backup.

a. memory

b. process

c. device

d. File

68. The base of the binary system is ____

a. 2

b. 8

c. 10

d. 16

69. An instruction that transfers program control to one or more possible paths is known as

a. Utility program

b. System software

c. Broadband channel

d. Application program

e. None of the above

70. A register in a cpu can hold _____

a. only data

b. only instructions

c. only program counter values

d. data, instructions, or program counter values


1. A modern electronic computer is a machine that is meant for
a. Doing quick mathematical calculations
b. Input storage, manipulation of outputting of data
c. Electronic data processing
d. Performing repetitive tasks accurately
e. None of the others
2. ___ means concealing the message by covering it with something else. a.
Cryptography
b. Steganography
c. Compressing
d. Authentication
3. In the attacks threatent integritive with ___ attack the attacker modifiles the
information to them
a. Snooping
b. Repudiation
c. Denial of service
d. Traffic analysis
4. The items are divided into two lists (sorted and unsorted) ___ sort. a.
Only in a selection
b. Only in a bubble
c. Only in an insertion
d. In selection, bubble, or insertion
5. ___ is a popular object-oriented language.
a. FORTRAN
b. COBOL
c. Java
d. LISP
6. Each row in a relation is called ___
a. An attribute
b. A tuple
c. A union
d. An attitude
7. In a ___ the project team needs to choose a language or a set of languages from
among it languages
a. Analysis phase
b. Design phase
c. Implementation phase
d. Testing place
8. The ___ of ethics says an act is ethical if a majority of people in society agree with it a.
Moral rules
b. Social contract
c. Utilization
d. Nonmaleficence
9. What type of OS evolution that need for more speed and efficiency led to the design
with multiple CPUs on the same machine?
a. Personal systems
b. Distributed systems
c. Parallel systems
d. Real-time systems
10. ___ explicitly defines connection establishment, data transfer, connection teardown
phases to provide a connection-oriented service AND reliable
a. TCP
b. UDP
c. IP
d. HTTP
11. What is statement that stores the value in the variable, which has already been created
in the declaration section. We use the symbol ← in our algorithm to define it?
a. Compound statement
b. Assignment statement
c. Control statement
d. None of above
12. Arithmetic right shift is used to ___ an integer by two
a. Addition
b. Subtraction
c. Divide
d. Multiply
13. A ___ is a collection of related elements possibly of different types having a single
name
a. Array
b. Record
c. Linked list
d. Tree
14. Inside the ADT are two different parts of the model that are ___ and ___
a. Data structure and operations
b. Application program and public operations
c. Application program and private operations
d. Data structure and application program
15. A device that prints one character at a time is known as
a. Laser printer
b. Line printer
c. Character printer
d. Dot-Matrix printer
e. None of the others
16. A register in a CPU can hold ___
a. Only data
b. Only instructions
c. Only program counter values
d. Data, instructions, or program counter values
17. In the ___ we can think of a program as an active agent that manipulates
passive objects.
a. Procedural paradigm
b. Functional paradigm
c. Declarative paradigm
d. Object-oriented paradigm
18. Conversion of binary number 1010101000010111 to hexadecimal number is ___
a. D8F9
b. A8B9
c. AA17
d. D9F8
e. None of the others
19. The term users in a DBMS has a broad meaning. We can divide users into:
a. End users and database administrators
b. End users and normal users
c. Application programs and end users
d. Application programs and database administrators
20. In the data link layer, Standard Ethernet is ___
a. 10 Mbps
b. 100 Mbps
c. 1 Gbps
d. 10 Gbps
21. Testing a software system can involve ___ testing
a. Black-box
b. Glass-box
c. Neither black-box nor glass-box
d. Both black-box and glass-box
22. A memory that does not change its contents without external causes is known as a.
Dynamic memory
b. Static memory
c. RAM
d. EEPROM
e. None of the others
23. The combination of sign and mantissa of a real number in IEEE standard floating
point format is stored as an integer in the ___ representation.
a. Unsigned
b. Sign-and-magnitude
c. Two’s complement
d. One’s complement
24. The software used to convert source program instructions to object instruction is
known as
a. Compiler
b. Assembler
c. Interpreter
d. Language processor
e. None of the others
25. In peripheral device management, what is the principle of hierarchical work on OS of
third-generation computers?
a. Processor - Peripheral device - Control device
b. Processor - Control device - Peripheral device
c. Control device - Peripheral device - processor
d. None of the answers are correct
26. In ___ cryptography, everyone has access to everyone’s public key. a.
Symmetric-key
b. Asymmetric-key
c. Secret-key
d. private-key
27. In the hierarchical database model, data is organized as an inverted ___ a.
Graph
b. Tree
c. Array
d. Record
28. The ___ manager is responsible for archiving and backup
a. Memory
b. Process
c. Device
d. File
29. What is quality referring to the ability to move software from one hardware platform to
another
a. Flexibility
b. Interoperability
c. Resusability
d. Changeability
30. Which is a unit representing the no bits of discrete
a. Baud
b. Byte
c. Bit
d. All of the others
e. None of the others
31. What is the name of the computer which was first used for programming and playing of
music?
a. ELLIAC
b. ENIAC
c. UNIVAC
d. All of the others
e. None of the others

32. An index register that is automatically incremented or decremented with each use is?
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others
33. The_______contruct uses a set of actions one after another.
A. Sequence
B. Decision
C. Repetition
D. Flow
34. The base of the binary system is_____?
A. 2
B. 8
C. 10
D. 16
35. The most important advantage of a video disk is______
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
36. ______ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
37. In the_______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary
38. Main memory is the second major subsystem in a computer. It consists of a collection of
storage locations, each with a unique identifier, called an_____?
A. Values
B. Address
C. Bit
D. Words
39. A process in the ready state goals to the running state when_____.
A. It enters memory
B. It request I/O
C. It get access to the CPU
D. It finishes running
40._______ is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
41. In ______ paradigm, the service provider is an application program, it runs continuously,
waiting for another application program, then to make a connection through the Internet and ask
for service.
A. P2P
B. Traditional
C. Client-server
D. Model
42. In a stream cipher encryption and decryption are done one symbol. We have a plaintext
stream a ciphertext stream and a______
A. Key block
B. Single Key
C. Key stream
D. Auto key
43. In monoprogramming, most of the memory capacity is dedicated to a__if we consider the
data to be processed by a program as part of the program.
A. Single program
B. Multi program
C. Address location
D. Set of instruction
44. How can we set name of nodes in a linked list?
A. Depend on the user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
45. There are serval methods for handling address collisions and each of them ___of the
hashing algorithm.
A. Independent
B. Dependent
C. Base on
D. Related
46. Defining the users, requirements, and methods is part of the ____ phase
A. Analysis
B. Design
C. Implementation
D. Testing
47. The_____in the TCP/IP protocol suite is responsible for the host-to-host delivery of the
messages.
A. Physical
B. Data-link
C. Network
D. Transport
48. If personal information about each employee in a company is stored in a file we can
use____ access to retrieve each record at the end of the month to print the paychecks. A.
Hashed file
B. Sequential file
C. EOF
D. Index file
49. The attack that reduces the capabilit of a computer is called a______ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
50. A company’s product or service is identified as a_______
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
51. The operation that takes two relations and combines the based on common attributes is
the ______ operation.
A. Join
B. Project
C. Union
D. Intersection
52. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the others
53. An_____ of a binary search tree (BST) creates a list that is sorted min ascending order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
54. An indexed file consists of______.
A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55. Each node in a graph can have ______parents
A. Only one
B. No node
C. One or more
D. At most two node
56. The enqueue operation___ an item at the _____ of the queue
A. Delete front
B. Delete end
C. Inserts front
D. Insert rear
57. A mechanism for arranging controlled access to a shared resource is
A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others
58. The octal equivant of 1100101.001010 is
Grouping in groups of three

A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the others
59. RISC (reduced instruction set computer). The strategy behind RISC architecture is to
have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
60. A data structure can be_____
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
1.Before a disk drive can access any sector record ,a computer program has to provide the
record’s address .What information does this address specify?
A.Track number
B.Sector number
C.Surface number
D.All of above
E.None of the above

2.The unit of a computer that executes program,communicates with and often controls the o
other subsystems of the computer is known as
A.CPU
B.Control unit
C.I/O unit
D.Peripheral unit
E.None of above.

3.A hybrid computer uses a ____ to convert digital signals from a computer into analog
signals.

Modem is short for "Modulator / Demodulator."


A.Modulator
B.Demodulator
C.Modem
D.Decoder
E.None of above.

4.____ is a measure of how tightly two modules are bound to each other.
A.Modularity
B.Coupling
C.Interoperability
D.Cohesion.

5.Registers which are partially visible to user and used to hold conditional codes (bits set by
the CPU as the result of operations), are known as
A.PC
B.Memory Address Registers
C.General purpose registers
D.Flags
E.None of above

6.Off-line operation is the operation of devices without the control of


A.Memory
B.CPU
C.ALU.
D.Control unit
E.None of the above

7. A type of channel used to connect a central processor and peripherals which uses
multiplying is known as
A.Modern
B.Network
C.Multiplexer
D.All of the above
E.None of above

8.Which is used to store firmware


A.RAM
B.ROM
C.PROM
D.EPROM
E.None of above

9.____ is a process in which an algorithm calls itself

A.Insertion
B.Searching
C. Recursion
D.Iteration

10.Which printer uses a combination of laser-beam & electro photographic techniques.


A.Laser printer
B.Dot-Matrix
C.Line printer
D.Daisy wheel
E.None of above

11.The difference between memory and storages is that memory is__ and storage is ___
A.Temporary, permanent
B.Permanent, temporary
C.Slow, fast
D.All of above
E.None of the above

12.In a three - level DBMS architecture, the ___ level interacts directly with the users
A. external
B. conceptual
C. interal
D. Physical
13.____ is a declarative language used on relational databases
A.PDQ
B.SQL
C.LES
D.PBJ

14. In postorder traversal of a perfect binary tree, the left subtree is processed____
A.first
B.second
C.last
D.after the right subtree

15.The list coded instructions is called


A. Computer program
B. Algorithm
C. Flowchart
D. Utility programs
E. None of the others
16. _____ is a protocol for e mail services
A. FTP
B. SMTP
C. TELNET
D. HTTP
17. Three security goals are____
A. confidentially, cryptography, and nonrepudiation
B. confidentially, encryption, and decryption
C. confidentially, integrity, and avalability
D. confidentially, denial of service, and masquerading
18. A computer assisted method for the recording and analyzing of existing or hypothetical
system
A.Data transmission
B.Data flow
C.Data capture
D.Data processing
E.None of the above

19. The pop operation____ of the stack.


A.deletes an item from the top
B.deletes an item from the bottom
C.deletes an item at the top
D.deletes an item at the bottom
20. The octal equivalent of 1100101.001010 is___
A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the above
21. data item which is not broken down into smaller units is___
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. Nine of the above
22. A stand-alone system which produces one page of printed output at a time is
A. Page printer
B. Line printer
C. Laser printer
D. Dot matrix printer
E. None of the above
23. To traverse a list, you need a ___ pointer.
A. null
B. walking
C. beginning
D. insertion
24. The index of an indexed file has___fields
A. two
B. three
C. four
D. any numbers of
25. In an inorder traversal of a perfect binary tree, the root is processed____.
A. first
B. second
C. last
D. two times
26. A byte consists of____ bits
A. 2
B. 4
C. 8
D. 16
27.____is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
28. The address product by a hashing algorith is the___address.
A. probe
B. synonym
C. collision
D. home
29. The___ is a computer subsystem that performs operations on data.
A. CPU
B. memory
C. I/O hardware
D. bus subsystem
30. An empty linked list consists of___
A. a mode
B. two mode
C. data and a link
D. a null head pointer
31. When we want to store music in a computer, the audio signal must be___.
A. sampled only
B. quatized only only
C. coded only
D. sampled, quatized and coded
32. When a sequential is updated, the___ file contains a list of all errors occurring during the
update process.
A. new master
B. old master
C. transaction
D. error report
33. AI input must be ON position to have an output is known as
A. NOT gate
B. AND gate
C. OR gate
D. XOR gate
E. None of the above
34. In the system development process, structure charts are tools used in the__phase.
A. analysis
B. design
C. implementation
D. testing
35. Each column in a relation is called____.
A. an attribute
B. a tuple
C. a union
D. an attitude
36. A___ program can be either an application or an applet.
A. FORTRAN
B. C++
C. C
D. Java
37.The___manager is responsible for archiving and backup.
A. memory
B. process
C. device
D. file

38. The attack that reduces the capacity of a computer is called a______ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
39. In the third generation of computers:
A. distributed data processing first became popular
B. an operating system was first developed
C. high-level procedural languages were first used
D. on-line, real time systems first became popular
E. All of the above
40. I a linked list, each element contains_____
A. only data
B. only a link
C. neither data nor a link
D. data and a link
41. The combination of sign and mantissa of a real number in IEEE standard floating point
format is integer in the______ representation.
A. unsigned
B. sign-and-magnitude
C. two’s complement
D. one’s complement
42. Any device that performs signal conversion is
A. Moduator
B. Modem
C. Keyboard
D. Plotter
E. None of the above
43. For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement for
A. 8
B. 127
C. 128
D. 256
44. A device that prints one character at a time is know as
A. Laser printer
B. line printer
C. Character printer
D. Dot-Matrix printer
E. None of the above
45. A right to a monopoly to use a pice of intellectual property is referred to as_____
A. trade mark
B. trade secret
C. patent
D. copyright
46. The operation that takes two relations and combines them based on common attributes is
the_____ operation
A. join
B. project
C. union
D. intersection
47. If A is the first data element input into a queue, followed by B,C, and D, then_____ is the
first remove
A. A
B. B
C. C
D. D
48. A computer language that is written in binary codes only is_____
A. machine language
B. C
C. C#
D. pascal
E. None of the above
49. In________ traversal of a perfect binary tree, the left subtree is processed second
A. preorder
B. inorder
C. postorder
D. out of order
50. The layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame
two adjacent nodes
A. transport
B. network
C. date-link
D. session
51. The organization and interconnection of the various components of a computer system is
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the above
52. How many symbols can be represented by a bit pattern with ten bits?
A. 128
B. 256
C. 512
D. 1024
53. The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the above
54. ______ Is a stand-alone storage location that holds data temporarily
A. An ALU
B. A register
C. A control unit
D. A tape drive
55. _______ operator (s) takes two inputs to produce one output
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
56. A data item which is not broken down into smaller units is______
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. None of the above
57 :______ protocol(s) is one of the protocols in the transport layer
A : Only TCP
B : Only UDP
C : Only SCTP
D : TCP , UDP and SCTP
58 : The base of the octal number system is
A: 2
B: 8
C: 10
D:16
59: ____ is an arithmetic operation
A : The exclusive OR
B : The unary NOT
C : Subtraction
D: The binary AND
60 : When a sequential file is updated , the __ file contains the changes to be applied
A : New master
B : Old master
C : Transaction
D : Error Report
61 : Each element in a record is called ___
A: a variable
B an index
C:a field
D:a node
62 : The RSA algorithm for confidentially uses ____ cryptography
A: asymmetric-key
B:symmetric -key
C:substitution
D: transposition
63 : _____ means that the data must arrive at the receiver exactly as they were sent
A: Nonrepudiation
B: Message integrity
C: Authentication
D : Secrecy
64 :The process of entering data into a storage location
A: adds to the contents of the location
B :cause variation in its address number
C :is known as a readout operation
D: is destructive of previous contents
E : None of the above
65: To prevent ____ , an operating system can put resource restrictions on processes
A : starvation
B : Synchronization
C : Paging
D : Deadlock
66 : The third generation of computers covers the period
A : 1971 - 1982
B:1982 -1994
C : 1959-1964
D: 1965-1971
E : 1995 - Now
67: if you want to change the value of an attribute of a tuple , you use the ___ operation A
. project
B. join
C: Update
D: Select
68 : A program that converts computer data into some code system other than the normal
one is known
A : Encoder
B : Simulation
C : Emulator
D : Coding
E : None of the above
69 : Tape is an example of storage device that can be accessed ______
A : sequentially
B : Randomly
C : Hash
D : No
70 : ______ is a protocol for file transfer
A : FTP
B :SMTP
C: TELNET
D: HTTP
1/ The _____ layer of the TCP/IP protocol suite transmits a bit steam over a physical
medium
A. Physical
B. Datalink
C. Transport
D. Network
2/ JPEG encoding involve ____, a process that reveals the redundancies in a block
A. Vectorization
B. Blocking
C. Quantization
D. The discrete cosine transform
3/ ______ can occur if a process has to many resource restriction
A. Deadlock
B. Synchronization
C. Paging
D. Starvation
4/ ______ cryptography is often for short messages.
A. Asymmetric-key
B. Secret-key
C. Symmetric-key
D. Open-key
5/ In_______, the identity of a party is verified once for the entire duration of system access.
A. Message authentication
B. Entity authentication
C. Message encryption
D. Message integrity
6/ In a computer, the ________ subsystem stores date and program.
A. Control unit
B. ALU
C. Input/output
D. Memory
7/ in the_______ graphic method of representing an image in a computer, re-scalling of the
image creates a ragged or grainy image.
A. Quantized
B. Vector
C. Bitmap
D. Binary
8/ To find the orientation of an object, we use:
A. Stereo vision
B. Segmentation
C. Texture
D. Motion
9/ The _______ construct tests a condition
A. Flow
B. Sequence
C. Decision
D. Repetition
10/ When a hashing algorithm produces an address for an insertion key and that ad-dress is
already occupied, it is called a___.
A. Linked list
B. Collision
C. Synonym
D. Probe
11/ Which number representation method is often used to store the exponential value of a
fractional part?
A. Ten’s complement
B. Excess
C. Unsigned integers
D. Two’s complement
12/ The_____ is a computer subsystem that performs operation on data.
A. Memory
B. Bus system
C. I/O hardward
D. CPU
13/ What is the domain name in the email address longnq9@fpt.edu.vn?
A. Fpt.edu.vn
B. Edu
C. Longnq9
D. Longnq9@fpt.edu.vn
14/ When we want to store music in a computer, the audio signal must be___.
A. Smpled only
B. Coded only
C. Quantized only
D. Sampled, quantized, and coded
15/ IP addresses are currently_____ bits in length.
A. 4
B. 40
C. 32
D. 8
16/ Each column in a relation is called____.
A. An attribute
B. A union
C. A tuple
D. An attitude
17/ A binary operation os applied to ______ relations (s) and creates an output of ____
relation(s)
A. One, two
B. Two, two
C. Two, one
D. One, one
18/ The three steps in the running of a program on a computer are performed in the specific
order____.
A. Fetch, decode, and execute
B. Fetch, execute, and decode
C. Decode, fetch, and execute
D. Decode, execute, and fetch
19/ The push operation_____ of the stack.
A. Deletes an item from the bottom
B. Inserts an item at the bottom
C. Deletes an item from the top
D. inserts an item at the top
20/ The____ scheduler moves a process form one process state to another.
A. Vietual
B. Process
C. Queue
D. Job
21/ _____ is a protocol for email services.
A. SMTP
B. TELNET
C. FTP
D. HTTP
22/ The____ level of a three-level DBMS architecture defines the logical view of the data.
A. Internal
B. External
C. Conceptual
D. Physical
23/ When a sequential file is updated, the_____ file gets the actual update.
A. Transaction
B. Error report
C. Old master
D. New master
24/ To un-set (force to 0) all the bits of a bit pattern, make of all 0s and then____ the bit
pattern and the mask.
A. NOT
B. AND
C. XOR
D. OR
25/ Main memory in a computer usually consists of large amounts of____speed memory.
A. High
B. Low
C. Very high speed
D. Medium
26/ in JPEG encoding, the___ process breaks the original picture into smaller blocks and
assigns a value to each pixel in a block.
A. The discrete cosine transform (DCT)
B. Blocking
C. Vectorization
D. Quantization
27/ The____ layer of the TCP/IP protocol suite is responsible for source-to-destinnation
delivery of the entire message.
A. Datalink
B. Transport
C. Session
D. Network
28/ In the_____ hashing method, the key is divided by the file size, and the address is the
remainder plus 1.
A. Modulo division
B. Direct
C. Digit extraction
D. Division remainder
29/ When converting a decimal fraction to base b, we repeatedly___b.
A. Subtract form
B. Divide by
C. Add to
D. Multiply by
30/ Which of the following is considered an intellectual property?
A. a patent
B. A strade secret
C. A strademark
D. All of the above

34. An indexed consists of ____.


A. only a random data file
B. only a sequential data file
C. only an index
D. an index and random data file
35. If the memory address space is 16 MB and the word size is 8 bits, then ___ bits are
needed to access each word.
A. 24
B. 16
C. 32
D. 8
36. The home page in Facebook can be used
A. only for sign-up
B both for sign-up and log-in
C. only for log-in
D neither for sign-up nor log-in
37. The complexity of a problem is O (Iog10 n) and the computer executes 1 million
instructions per second. How long does it take to run the program if the number of
operations is 10,000?
A. 1 microsecond
B 3 microseconds
C. 2 microseconds
D 4 microseconds
38. If the exponent in Excess_127 is binary 10000101. the exponent in decimal is__
A.6
B.9
C.8
D.7
39. In a linked list, each element contains____
A. both data and link
B. only data
C. neither data or a link
D. only a link
40.________ between modules in a software system must be minimized.
A. Neither coupling nor cohesion
B. Coupling
C. Both coupling and cohesion
D. Cohesion
41. ______is a memory type with capacitors that need to be refreshed periodically.
A. ROM
B CROM
C. SRAM
D. DRAM

42. In postorder traversal of a binary tree, the left subtree is processed _____

A. second
B last
C. first
D after the right subtree
43. In ____ cryptography, the same key is used by the sender and the receiver. A.
symmetric-key
B. public-key
C. asymmetric-key
D. open-key
44. A control unit with five wires can define up to ____ operations.
A. 5
B. 25
C. 10
D. 32
45. If you need to delete an attribute in a relation, you can use the ___ operation.
A. join
B. intersection
C. project
D. union
46. ____ data compression method, the received data need not be an exact copy of the
original message.
A. Only in JPEG
B. Only in JPEG
C. Only in MP3
D. In MP3. JPEG, or MPEG
47. If the memory has 2^32 words, the address bus needs to have ____ wires.
A. 32
B. 16
C. 64
D. 8
48. The ____ is a pointer that identifies the next element in the linked list.
A. link
B array
C. data
D node
49. ______ is multi-programming without swapping.
A. Virtual memory
B Demand paging
C. Partitioning
D Queuing
50. ________ is an English-language-like representation of code.
A. An algorithm
B An UML diagram
C. A program
D Pseudocode
51. If A is the first data element input into a stack, followed by B, C, and D, then ____ is the
first element to be removed.
A. C
B. A
C. D
D. B
52. We use a _____ search for an ordered list.
A. sequential
B. binary
C. bubble
D. insertion
53. If we are adding two numbers, one of which has an exponent value of 7 and the other an
exponent value of 9, we need to shift the decimal point of the smaller number
A. two places to the left
B. one place to the right
C. two places to the right
D. one place to the left
54. ____ is a process in which an algorithm call itself
A. Iteration
B. Recursion
C. Searching
D. Insertion
55.______ operator (s) takes two inputs to produce one output.
A. Only OR
B. Only NOT
C. Only AND
D. AND, OR, or NOT
56. In the system development process, writing the program is part of the _____ phase
A. implementation
B design
C. analysis
D testing
57. In ____ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.
A. selection
B every
C. bubble
D insertion
58. ____ between modules in a software system must be maximized.
A. Both coupling and cohesion
B Cohesion
C. Coupling
D. Neither coupling nor cohesion
59. A company’s product or service is identified as a______
A. a trademark
B. a patent
C. a trade secret
D. copyright
60. ____ is a unit that can add two inputs.
A. A register
B An ALU
C. A control unit
D. A tape drive
61. In a computer, the _____ subsystem performs calculations and logical opera-tions.
A. control unit
B ALU
C. memory
D input/output
62. In ______ cryptography, everyone has access to everyone's public key.
A. private-key
B symmetric-key
C. asymmetric-key
D secret-key
63. The ____ is the theoretical counterpart of the CPU.
A. disk
B tape
C. read/write head
D controller
64. We use ____ to denote a program's complexity.
A. the Simple Language
B factorials
C. big-0 notation
D the Turing number
65. In language understanding, parsing a sentence is part of:
A. semantic analysis
B syntactic analysis
C. pragmatic analysis
D speech recognition
66. In ____ encoding, the more frequently occurring characters have shorter codes than the
less frequently occurring characters.
A. JPEG
B . LZ
C. Huffman
D Run-length

67. A (n) _______ list is also known as a queue


A. unordered
B. FIFO
C. LIFO
D. ordered
68. A right to a written or created work is referred to as
A. a patient
B. a trademark
C. copyright
D. a trade secret
69. A _______ is a storage device to which the user can write information only once
A. CD-RR
B. CD-RW
C. CD-ROM
D. CD-R
70. In preorder traversal of binary tree, the_____
A. left subtree is processed first
B. the root is never processed
C. right subtree is processed first
D. root is processed first
71. The smallest area on a magnetic disk that can be accessed at one time is a _____.
A. sector
B. head
C. frame
D. track
72. A register in a CPU can hold _____.
A. only instructions
B. only data
C. data, instructions, or program counter values
D. only program counter values
73. ______ are keys that hash to the same location in the data file
A. Collisions
B. Linked Lists
C. Synonyms
D. Buckets
74. Which of the following is not a sentence in a propositional logic:
A. Where is John?
B. True
C. Ford is a car
D. If John is home then Mary is at work
75. The main foundation thinking machine came from:
A. Gottfried W. Leibniz
B. John McCarthy
C. Sir Isaac Newton
D. Alan Turing
76. The precision of the fractional part of a number stored in computer is defined by the ____
A. last digit
B. mantissa
C. exponent
D. sign
77. An empty linked list consist of _______
A. a node
B. a null head pointer
C. two nodes
D. data and link
78. In the______graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. bitmap
B. binary
C. quantized
D. vector
79. The controller has _____ states
A. three
B. a finite number of
C. four
D. an infinite number of
80. The _____ statement repeats one or more actions
A. decrement
B. complement
C. loop
D. increment
81. ______ is a basic algorithm in which we want to find a location of a target in a list of
items.
A. Sorting
B. Product
C. Summation
D. Searching
82. A ____ shows, among other things, the movement of the head/write head, the character
read, and the character written.
A. diagram
B. transition table
C. Turing machine
D. flowchart
83. In the _____ method for synchronizing the operation of CPU with an I/O device, the CPU is
idle until the I/O operation is finished.
A. isolated I/O
B. interrupt-driven I/O
C. programmed I/O
D. DMA
84. In an abstract data type, ______.
A. the ADT implementation is hidden
B. the ADT implementation is known
C. Nothing is hidden
D. the ADT public operations are hidden
85. The _______ is the theoretical counterpart of the CPU
A. controller
B. tape
C. read/write head
D. disk
86. The term Artificial Intelligence (AI) was first coined by:
A. Richard H. Richen
B. Alan Turing
C. Steven Spielberg
D. John McCarthy
87. The _____ manager is responsible for archiving and backup
A. memory
B. process
C. file
D. device
88. The ethical principle that measures the consequences of an act is referred to as ____
A. moral rules
B. none of the above
C. social contract
D. utilization
89. ______ can provide authentication , integrity, and nonrepudiation for a message
A. Encryption/ decryption
B. Key-exchange
C. Compression
D. Digital Signature
90. A ______ is a pictorial representations of states and their relationship to each other
A. flowchart
B. transition table
C. transition diagram
D. Turing machine
91. A node in semantic network becomes _______
A. an edge in frames
B. an object in frames
C. a line in frames
D. a slot in frames
92. Which physical topology uses a hub or switch?
A. bus and ring
B. ring
C. bus
D. star
93. In two’s complement representation with a 4-bit allocation, we get _______ when we
add 1 to 7
A. -8
B. -7
C. 8
D. 1
94. In _______, the identity of a party is verified once for the entire duration of system
access
A. message encryption
B. message integrity
C. entity authentication
D. message authentication
1. When a hashing algorithm produces an address for an insertion key and that address is
already called ___
A.collision
B.probe
C. synonym
D. linked list

2. An indexed file consists of ___


A. only a sequential data file
B. only an index
C. only a random data file
D. an index and random data file
3. ____is an arithmetic operation.
A. The exclusive OR
B. B. The unary NOT
C. C. Subtraction
D. D. The binary AND

4. When a sequential file is updated, the___ file contains the changes to be applied. A.
new master
B. old master
C. transaction
D. error report

5. The push operation ____ of the stack.


A. deletes an item from the top
B. B. deletes an item from the bottom
C. C. inserts an item at the top
D. D. inserts an item at the bottom

6. In a linked list, each element contains____.


A. only data
B. B. only a link
C. C. neither data nor a link
D. D. data and a link

7. We use a bit pattern called a ___ to modify another bit pattern.


A. mask
B. B. carry
C. C. float
D. D. byte

8. In an Excess conversion, we ____ the number to be converted


A. add the bias number to
B. B. subtract the bias number from
C. C. multiply the bias number by
D. D. divide the bias the number by.

9. A program that converts computer data into some code system other than the normal
one is known as.
A. Encoder
B. Simulation
C. Emulator
D. Coding
E. None of the above

10. The ALU of a computer responds to the commands coming from


A. primary memory
B. control section
C. external memory
D. cache memory
E. None of the above

11. Conversion of binary number 1010101000010111 to hexadecimal number is


A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the above

12. We use a ___ search for an ordered list.


A. sequential
B. binary
C. bubble
D insertion

13. In an inorder traversal of a perfect binary tree, the root is processed____


A. first
B. second
C. last
D. two times

14. The most important advantage of a video disk is_______


A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the above

15. An array that consists of just rows and columns is a ___ array.
A. one-dimensional
B. two-dimensional
C. three-dimensional
D. multidimensional
16. The TCP/IP model has___ layers.
A. five
B. SiX
C. seven
D. eight

17. The precision of the fractional part of a number stored in a computer is defined by
the____
A. sign
B. exponent
C. mantissa
D. last digit
18. The ethical principle that dictates that a decision should be made according to the
universally accepted principles of morality is referred to as ____
A. moral rules
B. utilization
C. social contract
D. none of the above

19. ____means concealing the message by covering it with something else.


A. Cryptography
B. Steganography
C. Compressing
D Authentication

20. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilization
C. social contract
D. none of the above

21. Pascal is a(n)______________ language.


A. procedural
B. functional
C. declarative
D. object-oriented

22. In___________ traversal of a perfect binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postorder
D. any order

23. Which of the following can store information in the form of microscopic pits on metal
disks.
A. Laser disks
B. Tape cassettes
C. RAM cartridge
D. Punched cards
E. None of the above

24. The base of the binary number system is___


A.2
B. 8
C. 10
D. 16

25. Information about a product is that is kept secret by the owner is referred to as a__

A. trade mark
B. trade secret
C. patent
D. copyright

26. In__________ cryptography, everyone has access to everyone's public key.

A. symmetric-key
B. asymmetric key
C. secret-key
D. privale-key
27. The________ construct tests a condition.
A. sequence
B. decision
C. repetition
D. flow construct tests a condition.

28. In_______ traversal of a perfect binary tree, the left subtree is processed
second.

A. preorder
B. inorder
C. postorder
D. out of order traversal of a perfect binary tree, the left subtree is processed second.

29. Which is a unit representing the no bits of discrete.


A. Baud
B. Byte
C. Bit
D. All of the above
E. None of the above

30._________ operator (s), if the input is two 1s, the output is 0.


A. In only AND
B. In only OR
C. In only XOR
D. In AND, OR, or XOR

31.___________ between modules in a software system must be minimized.

A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion

32. ___________is the breaking up of a large project into smaller parts

A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization

33. Who is considered the 'father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kennoth H. Olsen
C. Seymour Cray
D. Basic Pascal E.
None of the above

34. A_________ controller is a high-speed serial interface that transfers data in packets.

A. SCSI
B. USB
C. FireWire
D. USB and FireWire controller is a high-speed serial interface that transfers data in
packets.

35. ___________operator (s) takes two inputs to produce one output.

A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR

36. In_________cryptography, the same key is used in both directions.

A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key

37. The first electronic special-purpose computer was called_____


A. Pascal
B. Pascaline
C. ABC
D. ENIAC

38. In______sort, the item that goes into the sorted list is always the first item in the
unsorted list.
A.Selection
B. bubble
C. insertion
D. every

39. __________is a protocol for e mail services.


A. FTP
B. SMTP
C. TELNET
D. HTTP

40. C, C++, and Java can be classified as_______ lanquages

A. machine
B. symbolic
C. high-level
D. natural

41. ________is a measure of how tightly two modules are bound to each other.

A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
1.The_____deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
2.The format of an IPv4 address is referred to as______
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation

3.A register in a CPU can hold_____


A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values
4.The______ is a protocol that is used to define how the client-server programs can
be written pages from the Web.
A FIP
B. SMTP
C. TELNET
D. HTTP
5.A program becomes a_____ becomes a program again from the moment it
is selected for execution until it has finished
A.Program
B.Job
C.Process
D.Task
6.In_____ more than one program is in memory at the same time and they are
executed conct CPU switching rapidly between the programs
A. Monoprogramming
B. Multiprogramming
C.Microprogramming
D.Operating system
7.A billionth of a second is defined as a:
A. Millisecond
B. Microsecond
C.Nanosecond
D. Picoseconds
E. None of the others
8.Which is another name for functional language?
A. Machine
B. Application language
C. Low-level language
D. High-level language
E. None of the others
9.The role of the physical layer is to transfer the bits received from the data-link
layer and convert_______for transmission.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
10.There are several methods for handling address collisions and each of
them_______ of the hash
A. Independent
B. Dependent
C. Based on
D. Related
11._____is an ordered set of unambiguous steps that produces a result and
terminates in a finite time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
12.In a three-level DBMS architecture, the layer that interacts directly with the
hardware is the____level.
A. External
B. Conceptual
C. Internal
D. Physical
13.Which of the following is taking the one's complement of of the integer 00110110?
A. 11001100

B. 11001111
C. 11001001
D. 11100110
A
14.____uses the principle of logical reasoning to answer queries. It is based on
formal logic defined by Greek mathematicians and later developed into firstorder
predicale calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
15.In the data link layer, a Bluetooth LAN is a (an)____network
A. Wired WANs
B. Ad hoc
C. Dial-up service
D. Extended Service Set
16._______is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
Obsolescence
D. Modularization
17.The ability of a computer system to remain operational despite various failures is
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
18.Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
19.Defining the users, requirements, and methods is part of the
A. Analysis
B. Design
C. Implementation
D. Testing
phase.
20.In a____the project team needs to choose a language or a set of languages from
among the procedural languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
21.____can be threatened by security attacks
A. Confidentiality, cryptography, nonrepudiation
B. Confidentiality, encryption, decryption
C. Confidentiality, integrity, availability
D. Confidentiality, denial of service, masquerading
22.______protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
23.Static RAM (SRAM) technology uses____The gates hold their state 0 or 1
A. Ultraviolet light
B. Electronic impulses
C.Capacitors
D.Flip-flop gates
24.To search for elements. we can use____on sorted arravs that can help to
decrease time complexity
A Sequential search
B. Insertion Sort
C. Selection sort
D. Binary search
25.C language is a(n)_____ language
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
26.______is a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D.A tape drive
27.The number of bits per sample is sometimes referred to as the_____
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28.The maximum value of an octal integer with K=2 digits is Nmax =____
A. 63
B. 64
C. 65
D. 66
E. None of the others
29.A company's product or service is identified as a
A Trade mark
B. Trade secret
C. Patent
D.Copyright
30.Which of the following representations is erroneous?
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
30.What is method in black-box testing which tests are designed to include
representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
31.______is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest

32.A system program which helps the execution of user programs is known as

A. System software
B. Application program
C. Batch operating system
D. Utilities
E. None of the others

33.In the hierarchical database model, data is organized as an inverted

A. Graph
B. Tree
C. Array
D. Record

34.____can be measured by such metrics as mean time between failures number


of bugs per thousand lines of code and number of user requests for change.

A. Accuracy
B. Security
C. Efficiency
D. Correctability

35.In _________ sort, the smallest item moves to the beginning of the unsorted list.
There is no one-to-one swapping.
A Selection
B. Bubble
C. Insertion
D. Every
36._____ is an attack that reduce the capability of a computer system to
function correctly or bring the system down together by exhausting its
resources
A. DoS
B. Trojan horses
C. Worms
D. Viruses

37. Why OS is responsible for the efficient use of input/output devices?

A. Because need to maintains a queue for each input/output device

B. Because these devices are slower in speed compared with the CPU and
memory
C. It may use FIFO for one device
D. The manager also needs to know when a device has finished serving
one process

38. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100

39. The operation that takes two relations and combines them based on common
attributes is the operation.
A Join
B. Project
C. Union
D. Intersection

40. In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4

41. Which component is not an operating system component?


A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program

42. Which component is not an operating system component?


A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.____is the process by which a given set of relations are transformed to a new set of
relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
44. Each row in a relation is called
A. An attribute
B. A tuple
C. A union
D. An attitude

45. If the ASCII code for E is 1000101, then the ASCII code for e is consulting the
ASCII table.
A 1000110
B. 1000111
C. 0000110
D. 1100101

46.The push operation of the stack.


A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

47.We use the _____search for an ordered list.

A Sequential
B. Binary
C. Bubble
D. Insertion

48. An_____ is a sequence of operands and operators that reduces to a single value

A. Expression
B. Operator
C. Variables
D. Input/output

49. _____is a series of randomized letters and numbers which humans cannot make
any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

50. A____is a collection of related elements possibly of different types having a single
name

A. Array
B. Record
C. Linked list
D. Tree
51. In______cryptography, everyone has access to everyone's public key

A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52. In____,the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation

53. In a_____the relationship between a character in the plaintext to a character in the


ciphertext is one-to-many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher

54. Use a circular right shift operation on the bit pattern 1001 1000?
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000

55. Which type of computers use the 3 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others

56. A hashed file uses a


A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function to accomplish this mapping.

57. Who is considered the father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others

58. In____, ledges are ordered pairs of vertices. If x and y are two vertices and an edge
e = (x, y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs

59. The attack that reduces the capability of a computer is called a ____attack

A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

60. How can we set name of nodes in a linked list?


A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
1. What is returnted from an output device when it retrieves the bit string 00101011
stored in the unsigned integer?
(Choose 1 answer)
A. -43
B. 53
C. 43
D. -53
2. In the atacks threaten the confidentiality of information________ refers to
unauthorized access of data
(Choose 1 answer)
A. Denial of service
B. Traffic analysis
C. Snooping
D. Repudiation
3. An index register that is automatically incremented or decremented with each use is
(Choose 1 answer)
A. None of the others
B. Assembler
C. Asynchronous
D. Auto index
E. Compiler
4. Inside the ADT are two different parts of the model that are_____and ______
(Choose 1 answer)
A. Application program and public operations
B. Data structure and application program
C. Application program and private operations
D. Data structures and operations
5. An Ipv4 address is a _____ address that uniquely and the universally defines the
connection of a host or a router to the Internet.
(Choose 1 answer)
A. 32-bit
B. None of others
C. 128-bit
D. 64-bit
6. A word can be______ bits.
(Choose 1 answer)
A. Only 32
B. Only 8
C. 8, or 16, or 32
D. Only 16
7. A step-by-step solution to a problem is called_________ .
(Choose 1 answer)
A. Hardware
B. An algorithm
C. An operating system
D. A computer languge
8. What is the analysis process in the system implementation phase that will use a
program as that manipulates passive object?
(Choose 1 answer)
A. Classical analysis
B. All of the others
C. Structured analysis
D. Procedure-oriented analysis
9. The smallest storage area on a magnetic disk that can be accessed at one time is
a______
(Choose 1 answer)
A. Sector
B. Head
C. Track
D. Frame
10. What is language of procedural paradigm that is high level language and also
has some low
(Choose 1 Answer)
A. Pascal
B. C
C. Ada
D. COBOL
11. In ______ more than one program is in memory at the same time anf they arre
executed concu.. CPU switching rapidly between the programs
(Choose 1 answer)
A. Operating system
B. Monoprograming
C. Multiprograming
D. Microprograming
12. All the members of a record must be________ .
(Choose 1 answer)
A. Character type
B. Related types
C. The same type
D. Integer type
13. We use our ______ when we first log into the system. This contains any files
we create while in contain personal system files.
(Choose 1 answer)
A. Home directory
B. Root directory
C. Working directory
D. Parent directory
14. _________ means that the sender and the receiver expect confidentiality
(Choose 1 answer)
A. Authentication
B. Integrity
C. Encryption and decryption
D. Nonrepudiation
15. _______ is a program that facilitates the execution of the other programs
(Choose 1 answer)
A. A queue
B. An operating systerm
C. An applicaton program
D. Hardware
16. ______ were designed in the 1950s to control mainframe computers.
(Choose 1 answer)
A. Time-sharing systems
B. Parallel systems
C. Batch operating system
D. Personal systems
17. ______ is the breaking up of a large project into smaller parts
(Choose 1 answer)
A. Obsolescence
B. Modularization
C. Incrementing
D. Coupling
18. Use a simple right shift operation on the bi pattern 1001 1000
A. 1001 1000
B. 1001 1001
C. 0100 1100
D. 0100 1101
19. We use our___when we first log into the system. This contains any files we
create while in contain personal system files.
A. Parents directory
B. Working directory
C. Home directory
D. Root directory
20. A(n)___is a suitable structure when a small number of insertions and deletions are
required searching and retrievalis needed
A. Array
B. Tree
C. Record
D. Linked list
21. Which technique is use in multiprogramming that needs to be determined size
beforehand than manager and with each program occupying a contiguous space
A. Paging
B. Partitioning
C. Demand segmentation
D. Demand paging
22. _____is an English language-like representation of code
A. A program
B. Pseudocode
C. An algorithm
D. A UML diagram
23. The______manager is responsible for archiving and backup
A. Memory
B. File.
C. Device
D. Process
24.
25. A__is a noactive set of instructions stored on disk (or page). It may not
become a
A.Task
B. Job
C. Program
D. Process
26. A number which is stored and processed but not in the standard expotential is
called________
A. Decimal number
B. Octal number
C. Fixed point number
D. None of the others
E. Floating point number
27. C++ and C# language is a(n)_______number
A. Functional
B. Object-oriented
C. Procedural
D. Declarative
28. In_______sort, the item that goes into the sorted list is always the first item in the
unsorted
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
29. A step-by-step solution to the problem is called______
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
30.
31. Each node in a graph can have___parents
A. At most two node
B. No node
C. Only one
D. One or more
32. The smallest storage area on a magnetic disk that can be accepted at one time is a
_____
A. Taks
B. Frame
C. Sector
D. Head
33. The ethical principle that discuss that an act is ethical when a majority of people in
society ar referred to as_____
A. Social contract
B. Ultilization
C. None of the others
D. Moral rules
34.
35. An instruction that transfers program control to one or more possible paths is known
as_____
A. None of the others
B. Application program
C. Ultility program
D. System solution
36. ___ refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17,2 it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Bit depth
B. Encoding
C. Quantization
D. Sampling rate
37. An empty linked list consists of_____.
A. Datas and a link
B. Two nodes
C. A node
D. A null head pointer

38.

39. Symbolic languages were developed in


A. 1950
B. 1962
C. 1980
D. None of the others
E. 1974
40.

41. The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Running
C. Functioning properly
D. Finished
42. The ______manager is responsible for archiving and backup.
A. Memory
B. File
C. Process
D. Device
43. _____is a step-by-step method for solving a problem or doing a task.
A. A construct
B. An algorithm
C. A recursion
D. An iteration
44. After a sequential file is updated, the ______file contains the most current data.
A. Transaction
B. Old master
C. New master
D. Error report
45. In the relational database model data is organized in________called relations.
A. None of others
B. Two-dimensional array
C. Two-dimensional tables
D. Two-dimensional record
46.
47. What is the name given to the molecular-scale computer?
A. None of the others
B. Femtocomputer
C. Nanocomputer
D. Microcomputer
E. Supercomputer
48.
49. An instruction that transfers program control to one or more possible paths is known as
A. Broadband channel
B. None of the others
C. Utility program
D. System software
E. Application program
50. _______is an English-language-like representation of code.
A. A program
B. Pseudocode
C. A UML diagram
D. An algorithm
51. The first electronic special-purpose computer was called_______.
A. ENIAC
B. Pascaline
C. ABC
D. Pascal
52. A transport-layer payload may be_____in several network-layer packets.
A. Encrypted
B. Decapsulated
C. Decrypted
D. Encapsulated

53. The enqueue operation___an item at the___ of the queue.


(Choose 1 answer)
A. Insert font
B. Insert rear
C. Delete end
D. Delete front
54. In the binary system, the base b = 2 and we use only two symbols to represent numbers.
The system are often referred to as binary digits or___?
(Choose 1 answer)
A. Byte
B. Bitmap
C. Digits
D. Bits
55. In physical layer, a ____ can be broadly defined as anything that can carry information
from destination.
(Choose an answer)
A. Digital to-analog
B. Transmission medium
C. Analog-to-digital conversion
D. Digital-to-digital conversion
E. Analog-to-analog conversion
56. Arithemetic left shift is used to____ an integer by two.
(Choose an answer)
A. Multiply
B. Subtraction
C. Additon
D. Divide
57. ___ is process in which an algorithm calls itself.
(Choose 1 answer)
A. Insetion
B. Iteration
C. Searching
D. Recursion
58. The binary equivalent of the Octal number 13.54 is
(Choose 1 answer)
A. All of the others
B. None of the others
C. 1001.1110
D. 1011.1011
E. 1101.1110
Another Final
1.What is the analysis process in the system implemetation phase that will use a program
that manipulates passive object?
(Choose 1 answer)
A. Procedure-oriented analysis
B. All of others
C. Structured analysis
D. Classical analysis
2. Inside the ADT are two different parts of the model that are ___ and ___
(Choose 1 answer)
A. Application program and private operations
B. Application program and public operations
C. Data structure and operations
D. Data structure and application program
3. A word can be ____ bits.
A. Only 8
B. Only 32
C. Only 16
D. 8, or 16, or 32
4. Defining the usersm requirements, and methods is part of the ____ phase.
A. Analysis
B. Implementation
C. Testing
D. Design
5. The intersection operation is also a binary operation taking two relations and creating a
new relations must have the same ____
A. Relation
B. Name
C. Attributes
D. Size
6. Symbolic languages were developed in
A. 1950
B. 1962
C. None of the others
D. 1980
E. 1974
7. In the graphic method of representing an image in a computer, each pixel is assigned
A. Quantized
B. Binary
C. Vector
D. Bitmap
8. In the attacks threaten the confidentiality of Information ___ refers to unauthorized access
the of data.
A. Traffic analysis
B. Repudiation
C. Snooping
D. Denial of service
10. ___ were designed in the 1950s to control mainframe computers.
A. Personal system
B. Time-sharing system
C. Batch operating system
D. Parrallel systems
11. ___ more than one program is in the memory at the same time and they are executed
concur CPU switching rapidly between the programs
A. Operating system
B. Mono programing
C. Multiprograming
D. Microprograming
12. Which physical tology uses a hub or switch?
A. Bus and ring
B. Ring
C. Bus
D. Star
13. Each row in a relation is called ___.
A. An attribute
B. An attitude
C. A tuple
D. A union
14. An index register that is automatically incremented or decremented with each use is
A. Assembler
B. Asynchoronous
C. Auto index
D. None of the others
E. Complier
16. The enqueue operation ___ an item at the ___ of the queue.
A. Inserts front
B. Delete end
C. Insert rear
D. Delete front
18. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1000
B. 1001 1001
C. 0100 1100
D. 0100 1101
19. We use our ___ when we first log into the system. This contains any files we create while in
contain personal system files.
A. Parent directory
B. Working directory
C. Home directory
D. Root directory
20. A(n) ___ is a suitable structure when a small number of insertions and deletions are
requires searching and retrieval is needed.
A. Array
B. Tree
C. Record
D. Linked list
21. Which technique is used in multiprograming that needs to be determined size
beforehand the manager and with each program occupying a contiguous space?
A. Paging
B. Partitioning
C. Demand segmentation
D. Demand paging
22. ___ is an English-language-like representation of code.
A. A program
B. Pseudocode
C. An algorithm
D. A UML diagram
23. The ___ manager is responsible for archiving and backup.
A. Memory
B. File
C. Device
D. Process
25. A___ is a nonactive set of instructions stored on disk (or tape). It may or may not
become a
A. Task
B. Job
C. Program
D. Process
26. A number which is stored and processed but not in the standard exponential form is
called
A. Decimal number
B. Octal number
C. Fixed point number
D. None of the others
E. Floating point number
27. C++ and C#language are a(n) ____ language.
A. Functional
B. Object-oriented
C. Procedural
D. Declarative
28. in short, the item that goes into the sorted list is always the first item in the unsorted.
A. Bubble
B. Insertion
C. Selection
D. Every
29. A step-by-step solution to a problem is called ____.
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
31. Each node in a graph can have ___ parents.
A. At most two node
B. No node
C. Only one
D. One ore more
32. The smallest storage area on a magnetic disk that can be accessed at one time is a ___.
A. Track
B. Frame
C. Sector
D. Head
33. The ethical principle that dictates that an act is ethical when a majority of people in
society age referred to as ____.
A. Social contract
B. Ultilization
C. None of the others
D. Moral rules
35. An instruction that tranfers program control to one or more possible paths is known as
A. None of the others
B. Application
C. Broadland program
D. Utility program
E. System software
36. In physical layer, a ____ can be broadly defined as anything that can carry information
form destination.
A. Analog-to-analog conversion
B. Analog-to-digital conversion
C. Digital-to-digital conversion
D. Digital-to-analog conversion
E. Transmission medium
37. _____ is a step-by-step method for solving a problem or doing a task.
A. An itetation
B. A algorithm
C. A construct
D. A recursion
38. The parts of central processing unit (CPU)
A. ALU
B. Control unit
C. I/O devices
D. Registers
E. Optical device
F. Magnetic device
39. ____ refers to a process that rounds the value of a sample to the closest integer value.
For real value is 17.2, it can be rounded down to 17; if the values is 17.7, it can be rounded
up to
A. Sampling rate
B. Bit depth
C. Quantization
D. Encoding
40. We can convert a number in any system to decimal. We multiply each digit with its ___ in th
and add the result to get the number in the decimal system.
A. Numbers
B. Place value
C. None of others
D. Values
1. Convert the binary number (110.11)2 to decimal
A. 6.7
B. 7.75
C. 6.75
D. 27
2. Which of the following representations is erroneous?
A. (10111)2
B. (349)8
C. 3(AB)16
D. 256
3. In the ________ hashing method, selected digits are extracted from the key and used as
the address.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
4. If modules are written so that they can be reused in other systems then they have high
levels of _____
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
5. What is the order of Preorder traversal in Binary tree?
A. Right tree, Root tree, Left tree
B. Root tree, Right tree, Left tree
C. Left tree, Root tree, Right tree
D. Root tree, Left tree, Right tree
6. A register in a CPU can hold _____.
A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values
7. A one-bit signal that indicates the start of data transmission by an asynchronous device is
_______.
A. Parity bit
B. Status bit
C. Zero bit
D. Start bit
E. None of the others
8. The Stack operation returns an ____.
A. Full stack
B. Empty stack
C. Check status of stack
D. All of above
9. What is the method in black-box testing which tests are designed to representatives of
boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
10. Human beings are referred to as Homosapiens. Which device is called Silico sapiens?
A. Monitor
B. Hardware
C. Robot
D. Computer
E. None of the others
11. Which of the following is the expansion of EBCDIC?
A. Extended bit comparable to digital interface for computer
B. Extended bootable computerized digital infrared calculator
C. Extended binary coded decimal interchange code
D. Extended binary coded decimal information code
E. None of the others
12. In the hierarchical database model, data is organized as an inverted _____.
A. Graph
B. Tree
C. Array
D. Record
13. The _____ in the TCP/IP protocol suite is responsible for the host-to-host delivery of
messages
A. Physical
B. Data-link
C. Network
D. Transport
14. _____ is a very simple protocol using a minimum of overhead. If a process wants to send a
small message and does not care much about reliability.
A. TCP
B. UDP
C. IP
D. HTTP
15. The _____ of ethics says that we should avoid doing anything if it against universal
morality
A. Moral rules
B. Social contract
C. Utilization
D. Nonmaleficence
16. Information about a product is that is kept secret by the owner is referred to as a _____
A. Trademark
B. Trade secret
C. Patent
D. Copyright
17. In the modulo division hashing the reason for adding a 1 to the operation results is _____
A. That our list starts with 1 instead of 0
B. That the key starts from 1
C. That the prime number more than 1
D. All of others
18. _____ is a protocol for accessing and transferring documents on the WWW.
A. FTP
B. SMTP
C. TELNET
D. HTTP
19. Use a simple right shift operation on the bit pattern 1001 1000.
A.1001 1001
B. 1001 1000
C. 0100 1101
D.0100 1100
20. What is the result of difference database operation from 2 relation tables?
A. Neither the first relation nor the second.
B. Both of the first relation and the second.
C. The first relation but not the second.
D. The second but not the first.
21. The __ is the highest level in the file system hierarchy. This does not have a pRoot
directory
A. Home directory
B. Working directory
C. Parent directory
22. The dequeue operation ___ the item at the ___ of the queue
A.Delete front
B. Delete end
C. Inserts front
D. Insert rear
23. In paging, a program is divided into equally sized sections called_____.
A. Pages
B. Frames
C. Segments
D. Partitions
24. In the system development process, structure charts are tools used in the ____ phase.
A. Analysis
B. Design
C. Implementation
D. Testing
25. _____ results in a specification document that shows what the software what the
software will do without specifying how it will be done.
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
26. An _____ is a language-specific tokens that requires an action to be taken such as
arithmetic and rational
A. Expression
B. Operator
C. Variables
D. Input/output
27. What is a program of UNIX that accepts requests from users (processes) and interprets
them for the rest of the operating system?
A. Software
B. Function
C. SHELL
D. Feature
28. What is the result of one’s complement B ?
A. NOT B
B. Add B with 1
C. XOR B with 0
D. AND B with 0
E. OR B with 1
29. ______ means concealing the contents of a message by enciphering.
A. Steganography
B. Cryptography
C. Compressing
D. Authentication
30. _____ is required to allow any relation in the database to be represented, to allow a
query language
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
31. A program that is employed in the development, repair or enhancement of other
programs is known as
A. System software
B. Software tool
C. Applications program
D. Utility program
E. None of the others
32. Each element in record is called ____
A. A variable
B. An index
C. A field
D. A node
33. A technique used by codes to convert analog signal into a digital bit stream is known as
A. Pulse code modulation
B. Pulse Stretcher
C. Query processing
D. Queue management
E. None of the above
34. The device manager maintains one of more ____ for similar input/output devices
A. Graph
B. Array
C. Stack
D. Queue
35. _______ is usually privately owned, limited in size and connects some hosts in a single
office, building, or campus.
A. LAN
B. WAN
C. Internet
D. Network
36.Which of the following attacks is threatening integrity ?
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis
37.In a three level DBMS architecture, the layer that interacts directly with the hardware is
the _____level.
A. External
B. Conceptual
C. Internal
D. Physical.
38.Which is another name for functional language?
A. Machine
B. Application language
C. Low-level language
D. High-level language
E None of the others
39.Use an arithmetic right shift operation on the bit pattern 1001 1000.
A 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
40.____is a basic algorithm that adds a list of numbers
A. Summation
B. Product
C. Smallest
D. Largest
4 1.FORTRAN is a(n)____ language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented.
42.Which component is not an operating system component?
A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.Where have the program and data to be located before the ALU and control unit of a
computer can operate on it?
A. Internal memory
B. Secondary memory
C. Microprocessor
D. Magnetic tapes
E. None of the others
44.Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
45.In a____ a character (or a symbol) in the plaintext is always changed to the same
character (or symbol) in the ciphertext regardless of its position in the text
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
46.Which of the following is equivalent to 24 in decimal?
A. (11000)2
B. (1A)16
C. (31)8
D. None of the above
47.The___image encoding method, but it does not store the bit patterns for each pixel.
A. Bitmap
B. Quantized
C Vector graphic
D. Binary
48.An operating system is:
A. An interface between the hardware of a computer and the user
B. A program (or a set of programs) that facilitates the execution of other programs.
C. A general manager supervising the activity of each component in the computer system D.
Convert multimedia into binary
E. Operation on data
49.The ____layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a
frame between two adjacent nodes.
A. Transport
B. Network
C. Data-link
D. Session
50.In____edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x,
y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
51.Conversion of binary number 1010101000010111 to hexadecimal number is?
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
52.A multiprogramming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D Use many operating systems
E. None of the others
53.____is an ordered set of unambiguous steps that produces a result and terminates in a
finite time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm light.
……..can be programmed by the user. but can also be erased with a special device that
applies ultraviolet
A ROM
B. EEPROM
C. PROM
D. EPROM
54.According to the von Neumann model,_______ are stored in memory.
A. Only data
B. Only programs
C. Data and programs
D. Neither data nor programs
55.A number which is stored and processed but not in the standard exponential form is
called
A. Floating point number
B. Fixed point number
C. Octal number
D. Decimal number
E. None of the others
56.A process in the ready state goes to the running state when _____.
A. It enters memory
B. It requests I/O
C. It gets access to the CPU
D. It finishes running
57.Before insertion into a linked list we first apply the searching algoritm because we DO
NOT_____
A. Allow insertion into an empty list
B. Allow insertion in the middle of the list
C. Allow insertion at the beginning of the list
D. Allow data with duplicate values
58.When was Apple Macintosh II microcomputer introduced in the market?
A. 1964
B. 1970
C. 1986
D. 1987
E. None of the others
59. What is method in the object-oriented paradigm means that we can define several
operations with the same name that can do different things in related classes?
A. Method
B. Inheritance
C. Polymorphism
D. Classes
60.The no of logical records in a physical record is
A. Group
B. Blocking factor
C. Sector
D. Field
E. None of the others
61.A data structure can be _____.
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
62.The RSA algorithm for confidentiality uses_____crytography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition
63.In a DBMS__are those humans who can access the database directly to get information.
A. Database administrators
B. Normal users
C. Application programs
D. End users
64.One phase in system development is______
A. Analysis
B. Application
C. Designing
D. Collecting
65.The TCP/IP model has____layers.
A. Five
B. Six
C. Seven
D. Eight
66.We use the____search for ordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
67.In____sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every
68.___ who exploit the internet systems only to make public certain vast datasets of
information that would be
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
69.The binary equivalent of the Octal number 13,54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
70.In the ____method for synchronizing the operation of the CPU with an I/O device, the
CPU is idle until the I/O operation is finished.
A. Programmed I/O
B. Interrupt-driven I/O
C. DMA
D. Isolated I/O

File 2 (file cap):


7. Use a simple left shift operation of the bit pattern 1 0001 1000
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001
8. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of others
9. The _____ (of current directory) is the directory we are ‘in’ at any point in a user session.
A. Root directory
B. Home directory
C. Working directory
D. Parent directory
10. _____ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
11. Each node in a graph can have _____ parents.
A. Only one
B. No node
C. One or more
D. At most two node
12. _____ separated the programming task from computer operations tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
13. In the relational database model is organized in _____ called relations.
A. Two-dimensional array
B. Two-dimensional tables
C. Two-dimensional record
D. None of others
14. Which of following represents a set of data items that share a specific relationship?
A. ADT
B. Data structure
C. Programming language
D. Data element
15. The most important advantage of a video disk is _____.
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
16. Which is a unit representing the no bits of discrete.
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others
17. A ____ is a collection of related elements possibly of different types having a single
name.
A. Array
B. Record
C. Linked list
D. Tree
18. In CISC (complex instruction set compute), an instruction in machine language is not
executed by the CPU-the CPU performs only simple operations, that is called _____.
A. Micro operation
B. Micro memory
C. Micro computer
D. Micro programming
19. The code that should be adequate for present and anticipated data processing both for
machine use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others
20. A transport-layer payload may be _____ in several network-layer packets.
A. Encapsulated
B. Decapsulated
C. Encrypted
D. Decrypted
21. In the internet today, Backbones and provider networks are also called _____.
A. Customer networks
B. Provider networks
C. Peering points
D. Internet service providers (ISPs)
22. Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
23. Which of the following is not currently a topic in computer science?
A. Speech recognition
B. Artificial intelligence
C. Thermodynamics
D. Multiprocessing
E. None of the others
25. What is a model process of software development where requirements are divided into
multiple modules of the software development cycle?
A. Waterfall model
B. Incremental model
C. Development process
D. Software engineering
26. Which of the following is considered an intellectual property?
A. A trademark
B. A trade secret
C. A patent
D. All of the others
27. In a three level DBMS architecture, the ______ level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical
28. In the sign-and-magnitude representation, the memory location can hold four bits,
assume that we have stored integer-6 in a memory location and we then try to subtract 7
to the integer. The computer’s response is _____? 1.110 và 0.111 => s=1, M= 101
A. 6
B. -6
C. 7
D. -7
29. What kind of testing uses the structure of the software is required to guarantee that all
the decision constructs ( two-way and multiway) are tested on each branch?
A. Testing phase
B. White-box testing
C. Black-box testing
D. Boundary testing
30. In the storing images, what is the technique use to encode a pixel ?
A. True-color
B. Index-color
C. Color depth
D. Bit map
31. How many symbols can be represented by a bit pattern with ten bits ?
A. 128
B. 256
C. 512
D. 1024
32. At the transport layer, addresses are called_____ , and these define the application-layer
programs at the source and destination.
A. TCP
B. Port numbers
C. UDP
D. IP address

33.
A/an _______ is a program in a procedural language that is a set of statements. The
statements are normally executed one after another. However, sometimes it’s necessary to
change this sequential order. This figure illustrates for this statement.
A. Assignment statement
B. compound statement
C. None of others
D. Control statement
34. In______, the program can be divided into differently sized section
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
35. What is quality referring to the ability to move software from one hardware platform to
another
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
36. C, C++, and Java can be classified as ______ languages.
A. Machine
B. Symbolic
C. High-level
D. Natural
37. In a block cipher a _____ is used to encrypt the whole even if the key is made of multiple
values
A. Key block
B. Single key
C. Key stream
D. Auto key
38. In _______ traversal of a binary tree, the right subtree is processed last.
A. Preorder
B. Inorder
C. Postorder
D. Any order
39. In _______cryptography, the same key is used by the sender and the receiver.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Open-key
40. Which of following that describe to the secure, information needs to be hidden from
unauthorized access ?
A. Confidentiality
B. integrity
C. Availability
D. Masquerading
41. The operation that takes two relations and combines them based on common attributes is
the _____ operation.
A. Join
B. Project
C. Union
D. Intersection
43.____ can be programmed by the user. but can also be erased with a special device that
applies ultraviolet light.
A. ROM
B. EEPROM
C. PROM
D. EPROM
44.____these are the "bad guys". They are the types of hackers who break into computer
networks with purely negative motives such as monetary gain or reputation
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
45.Which access method is used for obtaining a record from a cassette tape
A. Direct
B. Sequential
C. Random
D. All of the others
E None of the others
46.We can convert a number in any system to decimal. We multiply each digit with its____ in
the source and add the result to get the number in the decimal system. A. Numbers
B. Values
C. Place value
D. None of others
47.In____ cryptography, everyone has access to everyone's public key.
A Symmetric-key
B. Asymmetric-key
C Secret-key
D. Private-key
48.____file can be accessed sequentially.
A A sequential
B. An indexed
C. A hashed
D. No
49.The____manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
50.Use a simple right shift operation on the bit pattern 1001 1000.
A 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
51.Adding numbers in two's complement is____
A. Like adding the numbers in decimal
B. Logic operations
C. Shift operations
D. Arithmetic shift operations
52.What happens if the size of memory is less than the size of the program in a
monoprogramming OS?
A Need to use virtual memory
B. No overflow
C. Overflow
D. The program cannot be run
53.____refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17.2, it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
54.IfA is the first data element input into a stack, followed by B, C, and D, then____is the first
element to be removed
A. A
B. B
C. C
D. D
55.Which of the following is the user programmed semiconductor memory?
A SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
56.In____ sort, the item that goes into the sorted list is always the first item in the unsorted
list.
A Selection
B. Bubble
C. Insertion
D. Every
57.The devices in Bluetooth LAN, SOmetimes called gadgets, find each other and make a
network called____
A. ESS
B. Ad hoc
C. BSS
D. A piconet
58.The ethical principle that dictates that an act is ethical when a majority of people in
society agrees with it is referred to as____
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
59.The ____ is a protocol that is used to define how the client-server programs can be
written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
60.There are____ basic constructs in computer -science.
A One
B. Two
C. Three
D. Four
61.A database management system (DBMS) is a combination of components
A. 2
B. 3
C. 4
D. 5
62.The____is a computer subsystem that performs operations on data.
A. CPU
B. Memory
C. I/O hardware
D. Bus subsystem
63.When a sequential file is updated, the _____file gets the actual update.
A. New master
B. Old master
C. Transaction
D. Error report
64.Java is a(n)______language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
65.The base of the decimal number system is_____
A. 2
B. 8
C. 10
D. 16
66.____is an English-language-like representation of code
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
67.In physical layer, a____, can have only a limited number of defined values.Although each
number, it is often as simple as 1 and 0.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
68.The binary equivalent of the Octal number 13.54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
69.We use a______search for an unordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
70.In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 20 in hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
71.How many bits that we can find in the decimal number 20 in binary system?
A. 4
B. 5
C. 6
D. 7
72.A___is a nonactive set of instructions stored on disk (or tape).It may or may not become a
job
A. Program
B. Job
C. Process
D. Task
73.Given a linked list called children, the pointer variable children identifies____element of
the linked list
A. The first
B. The second
C. The last
D. Any
74.Each row in a relation is called_____
A. An attribute
B. A tuple
C. A union
D. An attitude

75.The organization and interconnection of the various components of a computer system is

A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the others
76.The queue operation:”queue (queueName)” is used to____
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
77.The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Finished
C. Functioning properly
D. Running
To search for elements, we can use____on sorted arrays that can help to decrease time
co…..
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search

What is the number of bit patterns provided by a 7-bit code?


A. 256
B. 128
C. 64
D. 512
E. None of the others
How many connections (in the data bus) do we need to transfer 4 bytes of a word at the
sam…

A. 4
B. 8
C. 16
D. 32

The____is a pointer that identifies the next element in the linked list.
A. Link
B. Node
C. Array
D. Data

____were designed in the 1950s to control mainframe computers.


A. Time-sharing systems
B. Batch operating system
C. Personal systems
D. Parallel systems

In the_____a program is considered a mathematical function. In this context a function is


a…maps a list of inputs to a list of outputs.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

16. What is a program of UNIX that accepts requests from users (processes) and interprets
them the operating system?
A Software
B. Function
C. SHELL
D. Feature

17. The pop operation ........of the stack.

A. Deletes an item from the top


B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

18.The ASCII code for the character J is:


A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
A. None of the others

19.In. ......... a the project team needs to choose a language or a set of languages from
among the languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

20.......... is an English-language-like representation of an algorithm. There is no standard for


it- a lot of detail
A Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram

21. Which of the following attacks is threatening integrity?


A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding

22. The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALU
C. Control unit
D. Store location
E. None of the others

23. A process in the ...........state can go to either the ready, terminated, or waiting states.
A. Hold
B. Virtual
C. Running
D. Hold or running

24............ cryptography is often used for short messages.


A Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Open-key

25. We can convert a number in any system to decimal. We multiply each digit with its. ..... in
the and add the result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others

26. In the storing audio, if the signal is changing rapidly, we need more samples. It has been
sho ......... 40000 samples per second is good enough to reproduce an audio signal.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth

27. The ....... deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

28. Most important advantage of an IC is its

A Easy replacement in case of circuit failure


B. Extremely high reliability
C. Reduced cost
D. Low power consumption
E. None of the others

29. Instructions and memory addresses are represented by


A Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

30. The ...... manager is responsible for archiving and backup.


A. Memory
B. Process
C. Device
D. File

31. In the asymmetric-key method used for confidentiality, which key(s) is ( are ) publicly
known ?
A. Encryption Key only
B. Decryption Key only
C. Both Encryption and Decryption keys
D. Neither encryption key nor decryption key
E.
35. What is a program of UNIX that accepts requests from users (processes) and interprets
the operating system?
A. Software
B. Function
C. SHELL
D. Feature

36. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link.
B. Transport
C. Application
D. Physical

37. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known?
A. Encryption key only
B. Decryption key only
C. Both encryption and decryption keys
D. Neither encryption key nor decryption key

38. The term users in a DBMS has a broad meaning. We can divide users
into:A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrator

39. The queue operation: "queue (queueName)" is used to


A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue

40. One phase in system development is


A. Analysis
B. Application
C. Designing
D. Collecting

41. Each element in a record is called .


A variable
B. An index
C. A field
D. A node

42. file can be accessed


sequentially.
A sequential
B. An indexed
C. A hashed
D. No

43. The unary operation always results in a relation that has exactly one more
rowthan relation
A. Insert
B. Delete
C. Update
D. Select
No. CHAPTER 1-20
1 The _______ model is the basis for today's computers.
a. Leibnitz b. von Neumann c. Pascal d. Charles Babbage
2 In a computer, the _______ subsystem stores data and programs.
a. ALU b. input/output c. memory d. control unit
3 In a computer, the _______ subsystem performs calculations and logical operations.
a. ALU b. input/output c. memory d. control unit
4 In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU b. input/output c. memory d. control unit
5 In a computer, the _______ subsystem serves as a manager of the other subsystems.
a. ALU b. input/output c. memory d. control unit
6 According to the von Neumann model, _______ are stored in memory.
a. only data b. only programs c. data and programs d. neither data nor
programs
7 A step-by-step solution to a problem is called _______.
a. hardware b. an operating system c. a computer language d. an
algorithm
8 FORTRAN and COBOL are examples of _______.
a. hardware b. operating systems c. computer languages d. algorithms
9 A 17th-century computing machine that could perform addition and subtraction was the
_______.
a. Pascaline b. Jacquard loom c. Analytical Engine d. Babbage
machine
10 _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system b. An algorithm c. A data processor d. A
program
11 _______ is the design and writing of a program in structured form.
a. Software engineering b. Hardware engineering
c. Algorithm development d. Instructional architecture
12 The first electronic special-purpose computer was called _______.
a. Pascal b. Pascaline c. ABC d. ENIAC
13 One of the first computers based on the von Neumann model was called _______.
a. Pascal b. Pascaline c. ABC d. EDVAC
14 The first computing machine to use the idea of storage and programming was called
_______.
a. the Madeline b. EDVAC c. the Babbage machine d. the Jacquard
loom
15 _______ separated the programming task from computer operation tasks.
a. Algorithms b. Data processors
c. High-level programming languages d. Operating systems
16 The base of the decimal number system is ____.
a. 2 b. 8 c. 10 d. 16
17 The base of the binary number system is ____.
a. 2 b. 8 c. 10 d. 16
18 The base of the octal number system is ____.
a. 2 b. 8 c. 10 d. 16
19 The base of the hexadecimal number system is ____.
a. 2 b. 8 c. 10 d. 16
20 When converting a decimal integer to base b, we repeatedly _____ b.
a. divide by b. multiply by c. add to d. subtract from
21 When converting a decimal fraction to base b, we repeatedly ____b.
a. divide by b. multiply by c. add to d. subtract from
22 Which of the following representations is erroneous?
a. (10111)2 b. (349)8 c. (3AB)16 d. 256
23 Which of the following representations is erroneous?
a. (10211)2 b. (342)8 c. (EEE)16 d. 145
24 Which of the following representations is erroneous?
a. (111)2 b. (346)8 c. (EEG)16 d. 221
25 Which of the following representations is erroneous?
a. (110)2 b. (141)8 c. (EF)16 d. 22A
26 Which of the following is equivalent to 12 in decimal?
a. (1110)2 b. (C)16 c. (15)8 d. None of the above
27 Which of the following is equivalent to 24 in decimal?
a. (11000)2 b. (1A)16 c. (31)8 d. None of the above
28 A data structure can be _______.
a. only an array b. only a record
c. only a linked list d. an array, a record, or a linked list
29 An array that consists of just rows and columns is a _______ array.
a. one-dimensional b. two-dimensional
c. three-dimensional d. multidimensional
30 Each element in a record is called _______.
a. a variable b. an index c. a field d. a node
31 All the members of a record must be ______.
a. the same type b. related types c. integer type d. character type
32 _____ is an ordered collection of data in which each element contains the location of the
next element.
a. An array b. A record c. A linked list d. A file
33 In a linked list, each element contains _______.
a. only data b. only a link c. neither data nor a link d. data and a link
34 The _______ is a pointer that identifies the next element in the linked list.
a. link b. node c. array d. data
35 Given a linked list called children, the pointer variable children identifies ________ element
of the linked list.
a. the first b. the second c. the last d. any
36 An empty linked list consists of _______.
a. a node b. two nodes c. data and a link d. a null head pointer
37 To traverse a list, you need a _______ pointer.
a. null b. walking c. beginning d. insertion
38 _______ is a sequenced collection of elements, of the same data type. We can use indexes
to refer to the element of an array.
a. record b. an array c. linked list d. retrieval
39 _______ is a collection of related elements, possibly of different types, having a single-
name.
a. array b. linked list c. record d. field
40 ________ uses a collection of related variables that can be accessed individually or as a
whole and it represents a set of data items that share a specific relationship.
a. ADT b. Database c. SQL d. Data structure
41 How many are common operations there on array?
a. 3 b. 2 c. 5 d. 8
42 _______ defines a combination of elements, while ______ defines the identifiable parts of
an element.
a. An array/a record b. Record/ Linked list c. An array/Linked list d. List/
tuple
43 ________ is package that defines a new data type, defines operations on that data type,
and encapsulates the data and the operations.
a. ADT b. Database c. SQL d. Data structure
44 _______ is a restricted linear list in which all additions and deletions are made at one end,
called the top.
a. Queue b. Stack c. Binary tree d. ADT
45 A (n) ________ list is also known as a queue.
a. LIFO b. FIFO c. insert d. pop
46 If A is the first data element input into a stack, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
47 If A is the first data element input into a queue, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
48 We defined four basic operations on a queue
a. stack, push, pop, empty b. list, insert, delete, traverse, empty
c. queue, enqueue, dequeue, empty d. depth first, breadth first
49 The pop operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
50 The push operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
51 ______ is a tree in which no node can have more than two subtrees. In other words, a node
can have zero, one, or two subtrees.
a. Queue b. Stack c. Binary tree d. ADT
52 How many are most common operations defined for a binary tree?
a. 9 b. 7 c. 6 d. 5
53 In _______ the left subtree is processed first, then the root node and finally the right
subtree.
a. post-order traversal b. in-order traversal c. pre-order traversal d.
None of the above
54 In post-order traversal of a binary tree, the left subtree is processed________
a. First b. Second c. Third d. last
55 In preorder traversal of a binary tree, the ______is processed first, followed by the left
subtree
a. the right subtree b. root node c. Binary tree d. left subtree
56 _________ is a binary tree with one extra property: the key value of each node is greater
than the key values of nodes in each left subtree and smaller than the value of all nodes in
each right subtree
a. Queue b. Stack c. BST d. BTT
57 When a sequential file is updated, the ________ file gets the actual update.
a. New master b. Old master c. the transaction d. the error
report
58 When a sequential file is updated, the ________ file contains a list of all errors occurring
during the update process.
a. New master b. Old master c. the transaction d. the error
report
59 When a sequential file is updated, the ________ file contains the changes to be applied.
a. New master b. Old master c. the transaction d. the error
report
60 If the transaction file key is 20 and the first master file key is 25, then we ________ .
a. add the new record to the new master file b. delete the data
61 If the transaction file key is 20 with a delete code and the master file key is 20, then we
________ .
a. add the new record to the new master file b. delete the data
62 All the members of a record must be _______.

a. The same type b. The integer type c. the related types d. the
character type
63 The _______ level of a three-level DBMS architecture defines the logical view of the data
a. physical b. external c. internal d.
conceptual
64 In the system development process, structure charts are tools used in the _______ phase.
a. analysis b. implementation c. design d.
testing
65 In _______, the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
a. demand paging b. paging c. demand segmentation
d. partitioning
66 In a three-level DBMS architecture, the _______ level determines where data is actually
stored on the storage devices.
a. physical b. external c. internal d.
conceptual
67 In the system development process, writing the program is part of the _______ phase.

a. analysis b. implementation c. design d.


testing
68 A process in the _______ state can go to either the ready, terminated, or waiting states
a. Hold or running b. Virtual c. hold d.
running
69 In paging, a program is divided into equally sized sections called _______.

a. partitions b. pages c. frames d.


segments
70 The data model and the schema of a DBMS are often defined at the _______ level.

a. physical b. external c. internal d.


conceptual
71 _______ is a multi-programming method in which multiple programs are entirely in memory
with each program occupying a contiguous space

a. demand paging b. paging c. demand segmentation d.


partitioning
72 In a three-level DBMS architecture, the layer that interacts directly with the hardware is the
_______ level.

a. physical b. external c. internal d.


conceptual
73 In a three-level DBMS architecture, the _______ level interacts directly with the users.

a. physical b. external c. internal d.


conceptual
74 In _______, the program can be divided into differently sized sections.

a. demand paging b. paging c. demand segmentation d.


partitioning
75 Testing a software system can involve _______ testing.

a. both black-box and glass box b. glass box c. black box d. neither black
box nor glass box
76 Defining the users, requirements, and methods is part of the _______ phase

a. analysis b. implementation c. design d.


testing
77 In an abstract data type, _______.

a. The ADT implementation is known b. The ADT public operations are


hidden
c. The ADT implementation is hidden d. Nothing is hidden
78 One phase in system development is _______.

a. Collecting b. Application c. designing d.


analysis
79 A process in the ready state goes to the running state when _______.
a. it requests I/O b. it enters memory c. it gets access to the CPU d.
it finishes running
80 IP addresses are currently _______ bits in length.

a. 4 b. 8 c. 40 d. 32
81 The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.

a. data link b. network c. transport d.


physical
82 The TCP/IP model has _______ layers.

a. five b. seven c. six d.


eight
83 The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.

a. sign-and-magnitude b. unsigned c. two’s complement d.


one’s complement
84 In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures

a. binary b. quantized c. vector d.


bitmap
85 The precision of the fractional part of a number stored in a computer is defined by the
_______.
a. sign b. exponent c. last digit d.
mantissa
86 A 32-bit code called _______ represents symbols in all languages.

a. ANSI b. Unicode c. Extended ASCII d.


EBCDIC
87 If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the
question without consulting the ASCII table

a. 0000110 b. 1000110 c. 1100101 d.


1000110
88 In the _______ graphic method of representing an image in a computer, each pixel is
assigned a bit patterns

a. binary b. bitmap c. vector d.


quantized
89 _______ is a set of instructions in a computer language that tells the computer what to do
with data

a. A program b. A data processor c. an operating system d. an


algorithm
90 Which number representation method is often used to store the exponential value of a
fractional part?

a. unsigned integer b. Two’s complement c. ten’s complement d.


Excess
91 Which number representation method is often used to store the exponential value of a
fractional part?

a. track b. head c. sector d.


frame
92 The ________ method of integer representation is the most common
method for storing integers in computer memory.

a. one’s complement b. two’s complement c. sign-and-magnitude d.


mantissa
93 In two's complement addition, if there is a final carry after the left most
column addition, ________

a. discard it b. plus a number c. subtract a number d.


multiply a number
94 For an 8-bit allocation, the smallest decimal number that can be represented in two's
complement form is ________

a. 127 b. 128 c. -128 d. -


127
95 For an 8-bit allocation, the largest decimal number that can be represented in two's
complement form is ________

a. 256 b. 128 c. 512 d. 127


96 When a fractional part is normalized, the computer stores the ________

a. only sign b. sign, exponent, mantissa c. only exponent d.


only mantissa
97 The unary ________ operator inverts its single input.

a. NOT b. AND c. XOR d. OR


98 ________ operator (s), if the input is two 0s, the output is 0.

a. only AND b. NOT c. only XOR d. AND,


OR, XOR
99 ________ operator (s), if the input is two 1s, the output is 0.

a. only AND b. NOT c. only XOR d. AND,


OR, XOR
100 For the binary AND operation, only an input of ________ gives an output of 1
a. two 0s b. two 1s c. one 1s and one 0s d.
None of the above
101 For the binary OR operation, only an input of ________ gives an output of 0.

a. two 0s b. two 1s c. one 1s and one 0s d.


None of the above
102 We use a bit pattern called a ________ to modify another bit pattern

a. track b. frame c. sector d.


mask
103 The ________ is a computer subsystem that performs operations on data.

a. register b. CPU c. control unit d. ALU


104 ________ is a stand-alone storage location that holds data temporarily.

a. register b. CPU c. control unit d. ALU


105 _______ is a unit that can add two input

a. register b. CPU c. control unit d. ALU


106 A control unit with five wires can define up to ________ operations.

a. 64 b. 256 c. 32 d. 8
107 If the memory address space is 16 MB and the word size is 8 bits, then________ bits are
needed to access each word

a. 24 b. 16 c. 8 d. 32
108 The data in ________ is erased if the computer is powered down.

a. RAM b. hardware c. software d.


None of the above
109 ________ is a memory type with capacitors that need to be refreshed periodically.

a. SRAM b. ROM c. DRAM d.


EPROM
110 ________ is a memory type with traditional flip-flop gates to hold data.

a. DRAM b. SRAM c. ROM d.


EEPROM
111 There are ________ bytes in 16 Terabytes.

a. 24 b. 23 c. 28 d. 216
112 ________ is a type of memory in which the user, not the manufacturer, stores programs
that cannot be overwritten.
a. PROM b. DRAM c. SRAM d.
EPROM
113 The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of
a frame between two adjacent nodes
a. data link b. network c. transport d.
physical
114 The ________ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message

a. data link b. network c. transport d.


physical
115 In the ________ method for synchronizing the operation of the CPU with an I/O device, a
large block of data can be passed from an I/O device to memory directly

a. Interrupt-driven I/O b. Program I/O c. DMA d. I/O


module
116 In the ________ method for synchronizing the operation of the CPU with an I/O device, the
CPU is idle until the I/O operation is finished.

a. Interrupt-driven I/O b. Program I/O c. DMA d. I/O


module
117 The three steps in the running of a program on a computer are performed in the specific
order ________ .

a. fetch, decode, and execute b. data bus, address bus, control bus
c. SCSI, Fire wire, USB d. None of the above
118 A control bus with eight wires can define ________ operations.

a. 216 b. 512 c. 256 d. 64


119 If the memory has 232 words, the address bus needs to have ________wires.

a. 64 b. 512 c. 256 d. 32
120 A ________ is a storage device to which the user can write information only once.

a. CD-RW b. CD-R c. DVD d. None of


the above
121 A ________ is a storage device that can undergo multiple writes and erasures.

a. CD-RW b. CD-R c. DVD d. None of


the above
122 Multi-programming requires a ________ operating-system.

a. Personal system b. Time sharing c. Real-time system d. Parallel


system
123 DOS stands for: *

a. Demand Open Sources b. Disk Operating System


c. Device Outer Shell d. Direct Operating System
124 What binary value is equivalent to the hex number C43A?
a. 1100100100010110 b. 1100110101111010
c. 1100010000111010 d. 1100001101011101
125 What features of transistors made them superior for computers, compared with vacuum
tubes? *

a. They were more expensive than tubes but lasted longer and were cooler in temperature.
b. They didn't last as long as tubes but were less expensive.
c. They were cheaper and smaller than tubes.
d. They were cheaper, smaller, and cooler than tubes and lasted longer.
126 DSL speeds range from:

a. 256 Kbps to 1.5 Mbps b. 256 Mbps to 15 Mbps


c. 56 Kbps to 256 Kbps d. 100 Kbps to 156 Kbps
127 What uniquely identifies a row in a table? *

a. Index b. Field c. Primary key d. Tuple


128 A....... is a bot that actively reproduces itself across a network

a. Virus b. Troyjan c. Worm d. None of the above


129 Which of the following is not a valid DBMS?

a. SQL Server b. C++ c. Oracle d. DB2


130 Which is not a valid software development model? *

a. Waterfall b. Degradation c. Evolution d. Spiral e.


Incremental
131 What is the standard port number for HTTP?

a. 16 b. 32 c. 64 d. 80
132 A ____________ is used as a visual model for describing a program's logical steps

a. Class diagram b. Flowchart c. Use case diagram d. Design


document
133 Which of the following SQL SELECT options is used to organize the data being returned? *

a. SORT BY b. ORDER BY c. WHERE d. ARRANGE


134 With _________ the microchip is organized so that a section of memory cells is erased in a
single action.

a. ROM b. Flash c. PROM d. EEPROM


135 Which of the following converts source code into a computer language and results in an
executable file?

a. Interpreter b. Compiler c. Translator d. IDE


136 Which is not a step of the database design process?
a. Create the tables b. Create the relationships c. Investigate d. Add
the data
137 A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).

a. two, one b. one, one c. three, one d. one, two


138 A unary operator is applied to ________ relation(s) and creates an output of ________
relation(s).

a. two, one b. one, one c. three, one d. one, two


139 If you want to change the value of an attribute of a tuple, you use the ________ operation

a. ORDER BY b. JOIN c. INSERT d. UPDATE


140 The operation that takes two relations and combines them based on common attributes is
the ________ operation.

a. JOIN b. PROJECT c. UPDATE d. INSERT


141 The unary ________ operation always results in a relation that has exactly one more row
than the original relation.

a. JOIN b. DELETE c. UPDATE d. INSERT


142 Which of the following is OSI layer of repeater?

a. Data Link b. Network c. Physical d. Transport


143 ________ is a protocol for accessing and transferring documents on the WWW.

a. FTP b. SMTP c. HTTP d. All of the above


144 ________ is a protocol for email services.

a. FTP b. SMTP c. HTTP d. All of the above


145 ________ is a protocol for file transfer.

a. FTP b. SMTP c. HTTP d. All of the above


146 There are ________ basic constructs in computer -science.

a. 5 b. 4 c. 6 d. 3
147 The ________ construct uses a set of actions one after another.

a. repetition b. decision c. sequence d. All of the above


148 The ________ construct tests a condition.

a. repetition b. decision c. sequence d. All of the above


149 The ________ construct handles repeated actions.

a. repetition b. decision c. sequence d. All of the above


150 In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.

a. bubble b. selection c. insertion d. None of the above


151 In ________ sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the unsorted list.

a. bubble b. selection c. insertion d. None of the above


152 In ________ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.

a. bubble b. selection c. insertion d. None of the above


153 ________ is a basic algorithm in which we want to find the location of a target in a list of
items.

a. Binary b. looking c. sequential d. searching


154 We use a ________ search for an unordered list.

a. Binary b. random c. sequential d. searching


155 We use a ________ search for an ordered list.

a. Binary b. random c. sequential d. searching


156 C, C++, and Java can be classified as ________ languages.

a. primary-level b. high-level c. object-oriented d. All of the


above
157 Which of the following is a unary operator?

a. project b. intersection c. difference d. update


158 You want to create a relation called New that contains tuples that belong to both relation A
and relation B. For this, you can use the ________ operation

a. project b. intersection c. difference d. update


159 The purpose of HTTP is to

a. Format Web pages b. Transfer Web pages


c. Transfer address d. Transfer data

160 What is the positional value of the 7 in the base 8 number 2715?

a. 16 b.8 c. 64 d.100
161 Which of the following is not one of the basic Boolean operators?

a. AND b. OR c. NOT d. XOR


162 The process of arranges the disk's surface into addressable areas and sets up the disk's
basic directory tree structure
a. Partitioning b. Set up c. Booting d. Formatting
163 Which of the following circuit types is used to create SRAM?

a. Decoder b. Flip-flop c. LCD d. ROM


164 A _______________ in computer terminology is a set of wires and protocols designed to
facilitate data transfer

a. Gate b. Bus c. Boolean circuit d. CPU

Trang 13

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy