Tong Hop Final
Tong Hop Final
4. Personnel who design, program, operate and maintain computer equipment refers to
A. Console-operator
B. Programmer
C. Peopleware
D. System Analyst
E. None of the above
6. The operation that takes two relations and combines them based on common
attributes is the operation
A. join
B. project
C. union
D. intersection
10.To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then___ the
bit pattern and the mask.
A. AND
B. OR
C. XOR
D. NOT
11. A generalised software package produced to meet the bugs of a variety of data
processing users is known as
A. Utility programs
B. System software
C. Operating system
D. Application package
E.None of the above
13. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilitarianism
C. social contract
D. none of the above
15. Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B Microcomputers
C Mainframe computers
D. Supercomputers
E. None of the above
21. When a sequential file is updated, the ___ file contains a list of all errors occurring
during the update process
A. new master
B. old master
C. transaction
D. error report
24. If the transaction file key is 20 with a delete code and the master file key is 20, then
we___
A. add the transaction to the new master file
B. revise the contents of the old master file
C. delete the data
D. write the old master file record to the new master life
28 After a sequential file is updated, the___ file contains the most current data
A new master
B old master
C transaction
D error report
30. ___ means that the sender and the receiver expect confidentiality
A Non Repudiation
B integrity
C Authentication
D encryption and decryption
31. A hybrid computer used a ___ to convert digital signals from a computer into analog
signals
A. Modulator
B Demodulator
C Modem
D Decoder
E None of the above
32. In___ , the program can be divided into differently sized sections
A. partitioning
B paging
C demand paging
D demand segmentation
a. An array
b. A record
c. A linked list
d. A file
37. When a sequential file is updated, the ________ file gets the actual update.
a. New master
b. Old master
c. the transaction
d. the error report
39. The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.
a. Unsigned
b. Sign-and-magnitude
c. two’s complement
d. one’s complement
42. In the system development process, writing the program is part of the _______ phase.
a. Analysis
b. Implementation
c. design
d. testing
44. A data item which is not broken into smaller units is _____
a. Data element
b. Elementary data item
c. Data entry
d. Database management
e. None of above
46. A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).
a. one, one
b. one, two
c. two, one
d. two, two
47. The ________ construct uses a set of actions one after another.
a. Sequence
b. Decision
c. repetition
d. flow
48. In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU
b. input/output
c. memory
d. control unit
49. If A is the first data element input into a stack, followed by B, C, and D, then ________ is the
first element to be removed.
a. A
b. B
c. C
d. D
51. a _____ controller is a high-speed serial interface that transfers data in packets.
a. SCSI
b. USB
c. FireWire
d. USB and FireWire
52. a type of channel used to connect a central processor and peripherals which uses
multiplying is known as
a. Modern
b. Network
c. Multiplexer
d. All of the above
54. The most common binary code in use today is the 8 bit ASCII code. What do the letters
ASCII stand for?
a. American Standard Code for International Interchange
b. American Standard Code for Information Interchange
c. American Standard Code for Intelligence Interchange
d. American Scientific Code for Information Interchange
e. None of the above
a. only an array
b. only a record
c. only a linked list
d. an array, a record, or a linked list
58. In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures
a. bitmap
b. vector
c. quantized
d. Binary
59. Of the various database models, the ______ model is the most prevalent today.
a. hierarchical
b. network
c. relational
d. linked list
a. Magnetic card
b. Magnetic tape
c. Punched card
61. In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.
a. selection
b. bubble
c. insertion
a. Accumulator
b. Control unit
c. Register unit
d. Memory
a. 2
b. 8
c. 10
d. 16
a. (110)2
b. (141)8
c. (EF)16
d. 22A
65. Information about a product is that is kept secret by the owner is referred to as a ______
a. trade mark
b. trade secret
c. patent
d. Copyright
66. _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system
b. An algorithm
c. A data processor
d. A program
a. memory
b. process
c. device
d. File
a. 2
b. 8
c. 10
d. 16
69. An instruction that transfers program control to one or more possible paths is known as
a. Utility program
b. System software
c. Broadband channel
d. Application program
a. only data
b. only instructions
32. An index register that is automatically incremented or decremented with each use is?
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others
33. The_______contruct uses a set of actions one after another.
A. Sequence
B. Decision
C. Repetition
D. Flow
34. The base of the binary system is_____?
A. 2
B. 8
C. 10
D. 16
35. The most important advantage of a video disk is______
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
36. ______ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
37. In the_______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary
38. Main memory is the second major subsystem in a computer. It consists of a collection of
storage locations, each with a unique identifier, called an_____?
A. Values
B. Address
C. Bit
D. Words
39. A process in the ready state goals to the running state when_____.
A. It enters memory
B. It request I/O
C. It get access to the CPU
D. It finishes running
40._______ is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
41. In ______ paradigm, the service provider is an application program, it runs continuously,
waiting for another application program, then to make a connection through the Internet and ask
for service.
A. P2P
B. Traditional
C. Client-server
D. Model
42. In a stream cipher encryption and decryption are done one symbol. We have a plaintext
stream a ciphertext stream and a______
A. Key block
B. Single Key
C. Key stream
D. Auto key
43. In monoprogramming, most of the memory capacity is dedicated to a__if we consider the
data to be processed by a program as part of the program.
A. Single program
B. Multi program
C. Address location
D. Set of instruction
44. How can we set name of nodes in a linked list?
A. Depend on the user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
45. There are serval methods for handling address collisions and each of them ___of the
hashing algorithm.
A. Independent
B. Dependent
C. Base on
D. Related
46. Defining the users, requirements, and methods is part of the ____ phase
A. Analysis
B. Design
C. Implementation
D. Testing
47. The_____in the TCP/IP protocol suite is responsible for the host-to-host delivery of the
messages.
A. Physical
B. Data-link
C. Network
D. Transport
48. If personal information about each employee in a company is stored in a file we can
use____ access to retrieve each record at the end of the month to print the paychecks. A.
Hashed file
B. Sequential file
C. EOF
D. Index file
49. The attack that reduces the capabilit of a computer is called a______ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
50. A company’s product or service is identified as a_______
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
51. The operation that takes two relations and combines the based on common attributes is
the ______ operation.
A. Join
B. Project
C. Union
D. Intersection
52. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the others
53. An_____ of a binary search tree (BST) creates a list that is sorted min ascending order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
54. An indexed file consists of______.
A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55. Each node in a graph can have ______parents
A. Only one
B. No node
C. One or more
D. At most two node
56. The enqueue operation___ an item at the _____ of the queue
A. Delete front
B. Delete end
C. Inserts front
D. Insert rear
57. A mechanism for arranging controlled access to a shared resource is
A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others
58. The octal equivant of 1100101.001010 is
Grouping in groups of three
A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the others
59. RISC (reduced instruction set computer). The strategy behind RISC architecture is to
have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
60. A data structure can be_____
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
1.Before a disk drive can access any sector record ,a computer program has to provide the
record’s address .What information does this address specify?
A.Track number
B.Sector number
C.Surface number
D.All of above
E.None of the above
2.The unit of a computer that executes program,communicates with and often controls the o
other subsystems of the computer is known as
A.CPU
B.Control unit
C.I/O unit
D.Peripheral unit
E.None of above.
3.A hybrid computer uses a ____ to convert digital signals from a computer into analog
signals.
4.____ is a measure of how tightly two modules are bound to each other.
A.Modularity
B.Coupling
C.Interoperability
D.Cohesion.
5.Registers which are partially visible to user and used to hold conditional codes (bits set by
the CPU as the result of operations), are known as
A.PC
B.Memory Address Registers
C.General purpose registers
D.Flags
E.None of above
7. A type of channel used to connect a central processor and peripherals which uses
multiplying is known as
A.Modern
B.Network
C.Multiplexer
D.All of the above
E.None of above
A.Insertion
B.Searching
C. Recursion
D.Iteration
11.The difference between memory and storages is that memory is__ and storage is ___
A.Temporary, permanent
B.Permanent, temporary
C.Slow, fast
D.All of above
E.None of the above
12.In a three - level DBMS architecture, the ___ level interacts directly with the users
A. external
B. conceptual
C. interal
D. Physical
13.____ is a declarative language used on relational databases
A.PDQ
B.SQL
C.LES
D.PBJ
14. In postorder traversal of a perfect binary tree, the left subtree is processed____
A.first
B.second
C.last
D.after the right subtree
38. The attack that reduces the capacity of a computer is called a______ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
39. In the third generation of computers:
A. distributed data processing first became popular
B. an operating system was first developed
C. high-level procedural languages were first used
D. on-line, real time systems first became popular
E. All of the above
40. I a linked list, each element contains_____
A. only data
B. only a link
C. neither data nor a link
D. data and a link
41. The combination of sign and mantissa of a real number in IEEE standard floating point
format is integer in the______ representation.
A. unsigned
B. sign-and-magnitude
C. two’s complement
D. one’s complement
42. Any device that performs signal conversion is
A. Moduator
B. Modem
C. Keyboard
D. Plotter
E. None of the above
43. For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement for
A. 8
B. 127
C. 128
D. 256
44. A device that prints one character at a time is know as
A. Laser printer
B. line printer
C. Character printer
D. Dot-Matrix printer
E. None of the above
45. A right to a monopoly to use a pice of intellectual property is referred to as_____
A. trade mark
B. trade secret
C. patent
D. copyright
46. The operation that takes two relations and combines them based on common attributes is
the_____ operation
A. join
B. project
C. union
D. intersection
47. If A is the first data element input into a queue, followed by B,C, and D, then_____ is the
first remove
A. A
B. B
C. C
D. D
48. A computer language that is written in binary codes only is_____
A. machine language
B. C
C. C#
D. pascal
E. None of the above
49. In________ traversal of a perfect binary tree, the left subtree is processed second
A. preorder
B. inorder
C. postorder
D. out of order
50. The layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame
two adjacent nodes
A. transport
B. network
C. date-link
D. session
51. The organization and interconnection of the various components of a computer system is
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the above
52. How many symbols can be represented by a bit pattern with ten bits?
A. 128
B. 256
C. 512
D. 1024
53. The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the above
54. ______ Is a stand-alone storage location that holds data temporarily
A. An ALU
B. A register
C. A control unit
D. A tape drive
55. _______ operator (s) takes two inputs to produce one output
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
56. A data item which is not broken down into smaller units is______
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. None of the above
57 :______ protocol(s) is one of the protocols in the transport layer
A : Only TCP
B : Only UDP
C : Only SCTP
D : TCP , UDP and SCTP
58 : The base of the octal number system is
A: 2
B: 8
C: 10
D:16
59: ____ is an arithmetic operation
A : The exclusive OR
B : The unary NOT
C : Subtraction
D: The binary AND
60 : When a sequential file is updated , the __ file contains the changes to be applied
A : New master
B : Old master
C : Transaction
D : Error Report
61 : Each element in a record is called ___
A: a variable
B an index
C:a field
D:a node
62 : The RSA algorithm for confidentially uses ____ cryptography
A: asymmetric-key
B:symmetric -key
C:substitution
D: transposition
63 : _____ means that the data must arrive at the receiver exactly as they were sent
A: Nonrepudiation
B: Message integrity
C: Authentication
D : Secrecy
64 :The process of entering data into a storage location
A: adds to the contents of the location
B :cause variation in its address number
C :is known as a readout operation
D: is destructive of previous contents
E : None of the above
65: To prevent ____ , an operating system can put resource restrictions on processes
A : starvation
B : Synchronization
C : Paging
D : Deadlock
66 : The third generation of computers covers the period
A : 1971 - 1982
B:1982 -1994
C : 1959-1964
D: 1965-1971
E : 1995 - Now
67: if you want to change the value of an attribute of a tuple , you use the ___ operation A
. project
B. join
C: Update
D: Select
68 : A program that converts computer data into some code system other than the normal
one is known
A : Encoder
B : Simulation
C : Emulator
D : Coding
E : None of the above
69 : Tape is an example of storage device that can be accessed ______
A : sequentially
B : Randomly
C : Hash
D : No
70 : ______ is a protocol for file transfer
A : FTP
B :SMTP
C: TELNET
D: HTTP
1/ The _____ layer of the TCP/IP protocol suite transmits a bit steam over a physical
medium
A. Physical
B. Datalink
C. Transport
D. Network
2/ JPEG encoding involve ____, a process that reveals the redundancies in a block
A. Vectorization
B. Blocking
C. Quantization
D. The discrete cosine transform
3/ ______ can occur if a process has to many resource restriction
A. Deadlock
B. Synchronization
C. Paging
D. Starvation
4/ ______ cryptography is often for short messages.
A. Asymmetric-key
B. Secret-key
C. Symmetric-key
D. Open-key
5/ In_______, the identity of a party is verified once for the entire duration of system access.
A. Message authentication
B. Entity authentication
C. Message encryption
D. Message integrity
6/ In a computer, the ________ subsystem stores date and program.
A. Control unit
B. ALU
C. Input/output
D. Memory
7/ in the_______ graphic method of representing an image in a computer, re-scalling of the
image creates a ragged or grainy image.
A. Quantized
B. Vector
C. Bitmap
D. Binary
8/ To find the orientation of an object, we use:
A. Stereo vision
B. Segmentation
C. Texture
D. Motion
9/ The _______ construct tests a condition
A. Flow
B. Sequence
C. Decision
D. Repetition
10/ When a hashing algorithm produces an address for an insertion key and that ad-dress is
already occupied, it is called a___.
A. Linked list
B. Collision
C. Synonym
D. Probe
11/ Which number representation method is often used to store the exponential value of a
fractional part?
A. Ten’s complement
B. Excess
C. Unsigned integers
D. Two’s complement
12/ The_____ is a computer subsystem that performs operation on data.
A. Memory
B. Bus system
C. I/O hardward
D. CPU
13/ What is the domain name in the email address longnq9@fpt.edu.vn?
A. Fpt.edu.vn
B. Edu
C. Longnq9
D. Longnq9@fpt.edu.vn
14/ When we want to store music in a computer, the audio signal must be___.
A. Smpled only
B. Coded only
C. Quantized only
D. Sampled, quantized, and coded
15/ IP addresses are currently_____ bits in length.
A. 4
B. 40
C. 32
D. 8
16/ Each column in a relation is called____.
A. An attribute
B. A union
C. A tuple
D. An attitude
17/ A binary operation os applied to ______ relations (s) and creates an output of ____
relation(s)
A. One, two
B. Two, two
C. Two, one
D. One, one
18/ The three steps in the running of a program on a computer are performed in the specific
order____.
A. Fetch, decode, and execute
B. Fetch, execute, and decode
C. Decode, fetch, and execute
D. Decode, execute, and fetch
19/ The push operation_____ of the stack.
A. Deletes an item from the bottom
B. Inserts an item at the bottom
C. Deletes an item from the top
D. inserts an item at the top
20/ The____ scheduler moves a process form one process state to another.
A. Vietual
B. Process
C. Queue
D. Job
21/ _____ is a protocol for email services.
A. SMTP
B. TELNET
C. FTP
D. HTTP
22/ The____ level of a three-level DBMS architecture defines the logical view of the data.
A. Internal
B. External
C. Conceptual
D. Physical
23/ When a sequential file is updated, the_____ file gets the actual update.
A. Transaction
B. Error report
C. Old master
D. New master
24/ To un-set (force to 0) all the bits of a bit pattern, make of all 0s and then____ the bit
pattern and the mask.
A. NOT
B. AND
C. XOR
D. OR
25/ Main memory in a computer usually consists of large amounts of____speed memory.
A. High
B. Low
C. Very high speed
D. Medium
26/ in JPEG encoding, the___ process breaks the original picture into smaller blocks and
assigns a value to each pixel in a block.
A. The discrete cosine transform (DCT)
B. Blocking
C. Vectorization
D. Quantization
27/ The____ layer of the TCP/IP protocol suite is responsible for source-to-destinnation
delivery of the entire message.
A. Datalink
B. Transport
C. Session
D. Network
28/ In the_____ hashing method, the key is divided by the file size, and the address is the
remainder plus 1.
A. Modulo division
B. Direct
C. Digit extraction
D. Division remainder
29/ When converting a decimal fraction to base b, we repeatedly___b.
A. Subtract form
B. Divide by
C. Add to
D. Multiply by
30/ Which of the following is considered an intellectual property?
A. a patent
B. A strade secret
C. A strademark
D. All of the above
42. In postorder traversal of a binary tree, the left subtree is processed _____
A. second
B last
C. first
D after the right subtree
43. In ____ cryptography, the same key is used by the sender and the receiver. A.
symmetric-key
B. public-key
C. asymmetric-key
D. open-key
44. A control unit with five wires can define up to ____ operations.
A. 5
B. 25
C. 10
D. 32
45. If you need to delete an attribute in a relation, you can use the ___ operation.
A. join
B. intersection
C. project
D. union
46. ____ data compression method, the received data need not be an exact copy of the
original message.
A. Only in JPEG
B. Only in JPEG
C. Only in MP3
D. In MP3. JPEG, or MPEG
47. If the memory has 2^32 words, the address bus needs to have ____ wires.
A. 32
B. 16
C. 64
D. 8
48. The ____ is a pointer that identifies the next element in the linked list.
A. link
B array
C. data
D node
49. ______ is multi-programming without swapping.
A. Virtual memory
B Demand paging
C. Partitioning
D Queuing
50. ________ is an English-language-like representation of code.
A. An algorithm
B An UML diagram
C. A program
D Pseudocode
51. If A is the first data element input into a stack, followed by B, C, and D, then ____ is the
first element to be removed.
A. C
B. A
C. D
D. B
52. We use a _____ search for an ordered list.
A. sequential
B. binary
C. bubble
D. insertion
53. If we are adding two numbers, one of which has an exponent value of 7 and the other an
exponent value of 9, we need to shift the decimal point of the smaller number
A. two places to the left
B. one place to the right
C. two places to the right
D. one place to the left
54. ____ is a process in which an algorithm call itself
A. Iteration
B. Recursion
C. Searching
D. Insertion
55.______ operator (s) takes two inputs to produce one output.
A. Only OR
B. Only NOT
C. Only AND
D. AND, OR, or NOT
56. In the system development process, writing the program is part of the _____ phase
A. implementation
B design
C. analysis
D testing
57. In ____ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.
A. selection
B every
C. bubble
D insertion
58. ____ between modules in a software system must be maximized.
A. Both coupling and cohesion
B Cohesion
C. Coupling
D. Neither coupling nor cohesion
59. A company’s product or service is identified as a______
A. a trademark
B. a patent
C. a trade secret
D. copyright
60. ____ is a unit that can add two inputs.
A. A register
B An ALU
C. A control unit
D. A tape drive
61. In a computer, the _____ subsystem performs calculations and logical opera-tions.
A. control unit
B ALU
C. memory
D input/output
62. In ______ cryptography, everyone has access to everyone's public key.
A. private-key
B symmetric-key
C. asymmetric-key
D secret-key
63. The ____ is the theoretical counterpart of the CPU.
A. disk
B tape
C. read/write head
D controller
64. We use ____ to denote a program's complexity.
A. the Simple Language
B factorials
C. big-0 notation
D the Turing number
65. In language understanding, parsing a sentence is part of:
A. semantic analysis
B syntactic analysis
C. pragmatic analysis
D speech recognition
66. In ____ encoding, the more frequently occurring characters have shorter codes than the
less frequently occurring characters.
A. JPEG
B . LZ
C. Huffman
D Run-length
4. When a sequential file is updated, the___ file contains the changes to be applied. A.
new master
B. old master
C. transaction
D. error report
9. A program that converts computer data into some code system other than the normal
one is known as.
A. Encoder
B. Simulation
C. Emulator
D. Coding
E. None of the above
15. An array that consists of just rows and columns is a ___ array.
A. one-dimensional
B. two-dimensional
C. three-dimensional
D. multidimensional
16. The TCP/IP model has___ layers.
A. five
B. SiX
C. seven
D. eight
17. The precision of the fractional part of a number stored in a computer is defined by
the____
A. sign
B. exponent
C. mantissa
D. last digit
18. The ethical principle that dictates that a decision should be made according to the
universally accepted principles of morality is referred to as ____
A. moral rules
B. utilization
C. social contract
D. none of the above
20. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilization
C. social contract
D. none of the above
22. In___________ traversal of a perfect binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postorder
D. any order
23. Which of the following can store information in the form of microscopic pits on metal
disks.
A. Laser disks
B. Tape cassettes
C. RAM cartridge
D. Punched cards
E. None of the above
25. Information about a product is that is kept secret by the owner is referred to as a__
A. trade mark
B. trade secret
C. patent
D. copyright
A. symmetric-key
B. asymmetric key
C. secret-key
D. privale-key
27. The________ construct tests a condition.
A. sequence
B. decision
C. repetition
D. flow construct tests a condition.
28. In_______ traversal of a perfect binary tree, the left subtree is processed
second.
A. preorder
B. inorder
C. postorder
D. out of order traversal of a perfect binary tree, the left subtree is processed second.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
33. Who is considered the 'father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kennoth H. Olsen
C. Seymour Cray
D. Basic Pascal E.
None of the above
34. A_________ controller is a high-speed serial interface that transfers data in packets.
A. SCSI
B. USB
C. FireWire
D. USB and FireWire controller is a high-speed serial interface that transfers data in
packets.
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key
38. In______sort, the item that goes into the sorted list is always the first item in the
unsorted list.
A.Selection
B. bubble
C. insertion
D. every
A. machine
B. symbolic
C. high-level
D. natural
41. ________is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
1.The_____deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
2.The format of an IPv4 address is referred to as______
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation
B. 11001111
C. 11001001
D. 11100110
A
14.____uses the principle of logical reasoning to answer queries. It is based on
formal logic defined by Greek mathematicians and later developed into firstorder
predicale calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
15.In the data link layer, a Bluetooth LAN is a (an)____network
A. Wired WANs
B. Ad hoc
C. Dial-up service
D. Extended Service Set
16._______is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
Obsolescence
D. Modularization
17.The ability of a computer system to remain operational despite various failures is
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
18.Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
19.Defining the users, requirements, and methods is part of the
A. Analysis
B. Design
C. Implementation
D. Testing
phase.
20.In a____the project team needs to choose a language or a set of languages from
among the procedural languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
21.____can be threatened by security attacks
A. Confidentiality, cryptography, nonrepudiation
B. Confidentiality, encryption, decryption
C. Confidentiality, integrity, availability
D. Confidentiality, denial of service, masquerading
22.______protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
23.Static RAM (SRAM) technology uses____The gates hold their state 0 or 1
A. Ultraviolet light
B. Electronic impulses
C.Capacitors
D.Flip-flop gates
24.To search for elements. we can use____on sorted arravs that can help to
decrease time complexity
A Sequential search
B. Insertion Sort
C. Selection sort
D. Binary search
25.C language is a(n)_____ language
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
26.______is a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D.A tape drive
27.The number of bits per sample is sometimes referred to as the_____
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28.The maximum value of an octal integer with K=2 digits is Nmax =____
A. 63
B. 64
C. 65
D. 66
E. None of the others
29.A company's product or service is identified as a
A Trade mark
B. Trade secret
C. Patent
D.Copyright
30.Which of the following representations is erroneous?
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
30.What is method in black-box testing which tests are designed to include
representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
31.______is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
32.A system program which helps the execution of user programs is known as
A. System software
B. Application program
C. Batch operating system
D. Utilities
E. None of the others
A. Graph
B. Tree
C. Array
D. Record
A. Accuracy
B. Security
C. Efficiency
D. Correctability
35.In _________ sort, the smallest item moves to the beginning of the unsorted list.
There is no one-to-one swapping.
A Selection
B. Bubble
C. Insertion
D. Every
36._____ is an attack that reduce the capability of a computer system to
function correctly or bring the system down together by exhausting its
resources
A. DoS
B. Trojan horses
C. Worms
D. Viruses
B. Because these devices are slower in speed compared with the CPU and
memory
C. It may use FIFO for one device
D. The manager also needs to know when a device has finished serving
one process
38. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
39. The operation that takes two relations and combines them based on common
attributes is the operation.
A Join
B. Project
C. Union
D. Intersection
40. In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4
45. If the ASCII code for E is 1000101, then the ASCII code for e is consulting the
ASCII table.
A 1000110
B. 1000111
C. 0000110
D. 1100101
A Sequential
B. Binary
C. Bubble
D. Insertion
48. An_____ is a sequence of operands and operators that reduces to a single value
A. Expression
B. Operator
C. Variables
D. Input/output
49. _____is a series of randomized letters and numbers which humans cannot make
any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
50. A____is a collection of related elements possibly of different types having a single
name
A. Array
B. Record
C. Linked list
D. Tree
51. In______cryptography, everyone has access to everyone's public key
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52. In____,the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
54. Use a circular right shift operation on the bit pattern 1001 1000?
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000
55. Which type of computers use the 3 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others
57. Who is considered the father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others
58. In____, ledges are ordered pairs of vertices. If x and y are two vertices and an edge
e = (x, y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
59. The attack that reduces the capability of a computer is called a ____attack
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
38.
41. The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Running
C. Functioning properly
D. Finished
42. The ______manager is responsible for archiving and backup.
A. Memory
B. File
C. Process
D. Device
43. _____is a step-by-step method for solving a problem or doing a task.
A. A construct
B. An algorithm
C. A recursion
D. An iteration
44. After a sequential file is updated, the ______file contains the most current data.
A. Transaction
B. Old master
C. New master
D. Error report
45. In the relational database model data is organized in________called relations.
A. None of others
B. Two-dimensional array
C. Two-dimensional tables
D. Two-dimensional record
46.
47. What is the name given to the molecular-scale computer?
A. None of the others
B. Femtocomputer
C. Nanocomputer
D. Microcomputer
E. Supercomputer
48.
49. An instruction that transfers program control to one or more possible paths is known as
A. Broadband channel
B. None of the others
C. Utility program
D. System software
E. Application program
50. _______is an English-language-like representation of code.
A. A program
B. Pseudocode
C. A UML diagram
D. An algorithm
51. The first electronic special-purpose computer was called_______.
A. ENIAC
B. Pascaline
C. ABC
D. Pascal
52. A transport-layer payload may be_____in several network-layer packets.
A. Encrypted
B. Decapsulated
C. Decrypted
D. Encapsulated
33.
A/an _______ is a program in a procedural language that is a set of statements. The
statements are normally executed one after another. However, sometimes it’s necessary to
change this sequential order. This figure illustrates for this statement.
A. Assignment statement
B. compound statement
C. None of others
D. Control statement
34. In______, the program can be divided into differently sized section
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
35. What is quality referring to the ability to move software from one hardware platform to
another
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
36. C, C++, and Java can be classified as ______ languages.
A. Machine
B. Symbolic
C. High-level
D. Natural
37. In a block cipher a _____ is used to encrypt the whole even if the key is made of multiple
values
A. Key block
B. Single key
C. Key stream
D. Auto key
38. In _______ traversal of a binary tree, the right subtree is processed last.
A. Preorder
B. Inorder
C. Postorder
D. Any order
39. In _______cryptography, the same key is used by the sender and the receiver.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Open-key
40. Which of following that describe to the secure, information needs to be hidden from
unauthorized access ?
A. Confidentiality
B. integrity
C. Availability
D. Masquerading
41. The operation that takes two relations and combines them based on common attributes is
the _____ operation.
A. Join
B. Project
C. Union
D. Intersection
43.____ can be programmed by the user. but can also be erased with a special device that
applies ultraviolet light.
A. ROM
B. EEPROM
C. PROM
D. EPROM
44.____these are the "bad guys". They are the types of hackers who break into computer
networks with purely negative motives such as monetary gain or reputation
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
45.Which access method is used for obtaining a record from a cassette tape
A. Direct
B. Sequential
C. Random
D. All of the others
E None of the others
46.We can convert a number in any system to decimal. We multiply each digit with its____ in
the source and add the result to get the number in the decimal system. A. Numbers
B. Values
C. Place value
D. None of others
47.In____ cryptography, everyone has access to everyone's public key.
A Symmetric-key
B. Asymmetric-key
C Secret-key
D. Private-key
48.____file can be accessed sequentially.
A A sequential
B. An indexed
C. A hashed
D. No
49.The____manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
50.Use a simple right shift operation on the bit pattern 1001 1000.
A 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
51.Adding numbers in two's complement is____
A. Like adding the numbers in decimal
B. Logic operations
C. Shift operations
D. Arithmetic shift operations
52.What happens if the size of memory is less than the size of the program in a
monoprogramming OS?
A Need to use virtual memory
B. No overflow
C. Overflow
D. The program cannot be run
53.____refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17.2, it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
54.IfA is the first data element input into a stack, followed by B, C, and D, then____is the first
element to be removed
A. A
B. B
C. C
D. D
55.Which of the following is the user programmed semiconductor memory?
A SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
56.In____ sort, the item that goes into the sorted list is always the first item in the unsorted
list.
A Selection
B. Bubble
C. Insertion
D. Every
57.The devices in Bluetooth LAN, SOmetimes called gadgets, find each other and make a
network called____
A. ESS
B. Ad hoc
C. BSS
D. A piconet
58.The ethical principle that dictates that an act is ethical when a majority of people in
society agrees with it is referred to as____
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
59.The ____ is a protocol that is used to define how the client-server programs can be
written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
60.There are____ basic constructs in computer -science.
A One
B. Two
C. Three
D. Four
61.A database management system (DBMS) is a combination of components
A. 2
B. 3
C. 4
D. 5
62.The____is a computer subsystem that performs operations on data.
A. CPU
B. Memory
C. I/O hardware
D. Bus subsystem
63.When a sequential file is updated, the _____file gets the actual update.
A. New master
B. Old master
C. Transaction
D. Error report
64.Java is a(n)______language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
65.The base of the decimal number system is_____
A. 2
B. 8
C. 10
D. 16
66.____is an English-language-like representation of code
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
67.In physical layer, a____, can have only a limited number of defined values.Although each
number, it is often as simple as 1 and 0.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
68.The binary equivalent of the Octal number 13.54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
69.We use a______search for an unordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
70.In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 20 in hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
71.How many bits that we can find in the decimal number 20 in binary system?
A. 4
B. 5
C. 6
D. 7
72.A___is a nonactive set of instructions stored on disk (or tape).It may or may not become a
job
A. Program
B. Job
C. Process
D. Task
73.Given a linked list called children, the pointer variable children identifies____element of
the linked list
A. The first
B. The second
C. The last
D. Any
74.Each row in a relation is called_____
A. An attribute
B. A tuple
C. A union
D. An attitude
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the others
76.The queue operation:”queue (queueName)” is used to____
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
77.The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Finished
C. Functioning properly
D. Running
To search for elements, we can use____on sorted arrays that can help to decrease time
co…..
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
A. 4
B. 8
C. 16
D. 32
The____is a pointer that identifies the next element in the linked list.
A. Link
B. Node
C. Array
D. Data
16. What is a program of UNIX that accepts requests from users (processes) and interprets
them the operating system?
A Software
B. Function
C. SHELL
D. Feature
19.In. ......... a the project team needs to choose a language or a set of languages from
among the languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
22. The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALU
C. Control unit
D. Store location
E. None of the others
23. A process in the ...........state can go to either the ready, terminated, or waiting states.
A. Hold
B. Virtual
C. Running
D. Hold or running
25. We can convert a number in any system to decimal. We multiply each digit with its. ..... in
the and add the result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others
26. In the storing audio, if the signal is changing rapidly, we need more samples. It has been
sho ......... 40000 samples per second is good enough to reproduce an audio signal.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
27. The ....... deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
31. In the asymmetric-key method used for confidentiality, which key(s) is ( are ) publicly
known ?
A. Encryption Key only
B. Decryption Key only
C. Both Encryption and Decryption keys
D. Neither encryption key nor decryption key
E.
35. What is a program of UNIX that accepts requests from users (processes) and interprets
the operating system?
A. Software
B. Function
C. SHELL
D. Feature
36. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link.
B. Transport
C. Application
D. Physical
37. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known?
A. Encryption key only
B. Decryption key only
C. Both encryption and decryption keys
D. Neither encryption key nor decryption key
38. The term users in a DBMS has a broad meaning. We can divide users
into:A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrator
43. The unary operation always results in a relation that has exactly one more
rowthan relation
A. Insert
B. Delete
C. Update
D. Select
No. CHAPTER 1-20
1 The _______ model is the basis for today's computers.
a. Leibnitz b. von Neumann c. Pascal d. Charles Babbage
2 In a computer, the _______ subsystem stores data and programs.
a. ALU b. input/output c. memory d. control unit
3 In a computer, the _______ subsystem performs calculations and logical operations.
a. ALU b. input/output c. memory d. control unit
4 In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU b. input/output c. memory d. control unit
5 In a computer, the _______ subsystem serves as a manager of the other subsystems.
a. ALU b. input/output c. memory d. control unit
6 According to the von Neumann model, _______ are stored in memory.
a. only data b. only programs c. data and programs d. neither data nor
programs
7 A step-by-step solution to a problem is called _______.
a. hardware b. an operating system c. a computer language d. an
algorithm
8 FORTRAN and COBOL are examples of _______.
a. hardware b. operating systems c. computer languages d. algorithms
9 A 17th-century computing machine that could perform addition and subtraction was the
_______.
a. Pascaline b. Jacquard loom c. Analytical Engine d. Babbage
machine
10 _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system b. An algorithm c. A data processor d. A
program
11 _______ is the design and writing of a program in structured form.
a. Software engineering b. Hardware engineering
c. Algorithm development d. Instructional architecture
12 The first electronic special-purpose computer was called _______.
a. Pascal b. Pascaline c. ABC d. ENIAC
13 One of the first computers based on the von Neumann model was called _______.
a. Pascal b. Pascaline c. ABC d. EDVAC
14 The first computing machine to use the idea of storage and programming was called
_______.
a. the Madeline b. EDVAC c. the Babbage machine d. the Jacquard
loom
15 _______ separated the programming task from computer operation tasks.
a. Algorithms b. Data processors
c. High-level programming languages d. Operating systems
16 The base of the decimal number system is ____.
a. 2 b. 8 c. 10 d. 16
17 The base of the binary number system is ____.
a. 2 b. 8 c. 10 d. 16
18 The base of the octal number system is ____.
a. 2 b. 8 c. 10 d. 16
19 The base of the hexadecimal number system is ____.
a. 2 b. 8 c. 10 d. 16
20 When converting a decimal integer to base b, we repeatedly _____ b.
a. divide by b. multiply by c. add to d. subtract from
21 When converting a decimal fraction to base b, we repeatedly ____b.
a. divide by b. multiply by c. add to d. subtract from
22 Which of the following representations is erroneous?
a. (10111)2 b. (349)8 c. (3AB)16 d. 256
23 Which of the following representations is erroneous?
a. (10211)2 b. (342)8 c. (EEE)16 d. 145
24 Which of the following representations is erroneous?
a. (111)2 b. (346)8 c. (EEG)16 d. 221
25 Which of the following representations is erroneous?
a. (110)2 b. (141)8 c. (EF)16 d. 22A
26 Which of the following is equivalent to 12 in decimal?
a. (1110)2 b. (C)16 c. (15)8 d. None of the above
27 Which of the following is equivalent to 24 in decimal?
a. (11000)2 b. (1A)16 c. (31)8 d. None of the above
28 A data structure can be _______.
a. only an array b. only a record
c. only a linked list d. an array, a record, or a linked list
29 An array that consists of just rows and columns is a _______ array.
a. one-dimensional b. two-dimensional
c. three-dimensional d. multidimensional
30 Each element in a record is called _______.
a. a variable b. an index c. a field d. a node
31 All the members of a record must be ______.
a. the same type b. related types c. integer type d. character type
32 _____ is an ordered collection of data in which each element contains the location of the
next element.
a. An array b. A record c. A linked list d. A file
33 In a linked list, each element contains _______.
a. only data b. only a link c. neither data nor a link d. data and a link
34 The _______ is a pointer that identifies the next element in the linked list.
a. link b. node c. array d. data
35 Given a linked list called children, the pointer variable children identifies ________ element
of the linked list.
a. the first b. the second c. the last d. any
36 An empty linked list consists of _______.
a. a node b. two nodes c. data and a link d. a null head pointer
37 To traverse a list, you need a _______ pointer.
a. null b. walking c. beginning d. insertion
38 _______ is a sequenced collection of elements, of the same data type. We can use indexes
to refer to the element of an array.
a. record b. an array c. linked list d. retrieval
39 _______ is a collection of related elements, possibly of different types, having a single-
name.
a. array b. linked list c. record d. field
40 ________ uses a collection of related variables that can be accessed individually or as a
whole and it represents a set of data items that share a specific relationship.
a. ADT b. Database c. SQL d. Data structure
41 How many are common operations there on array?
a. 3 b. 2 c. 5 d. 8
42 _______ defines a combination of elements, while ______ defines the identifiable parts of
an element.
a. An array/a record b. Record/ Linked list c. An array/Linked list d. List/
tuple
43 ________ is package that defines a new data type, defines operations on that data type,
and encapsulates the data and the operations.
a. ADT b. Database c. SQL d. Data structure
44 _______ is a restricted linear list in which all additions and deletions are made at one end,
called the top.
a. Queue b. Stack c. Binary tree d. ADT
45 A (n) ________ list is also known as a queue.
a. LIFO b. FIFO c. insert d. pop
46 If A is the first data element input into a stack, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
47 If A is the first data element input into a queue, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
48 We defined four basic operations on a queue
a. stack, push, pop, empty b. list, insert, delete, traverse, empty
c. queue, enqueue, dequeue, empty d. depth first, breadth first
49 The pop operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
50 The push operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
51 ______ is a tree in which no node can have more than two subtrees. In other words, a node
can have zero, one, or two subtrees.
a. Queue b. Stack c. Binary tree d. ADT
52 How many are most common operations defined for a binary tree?
a. 9 b. 7 c. 6 d. 5
53 In _______ the left subtree is processed first, then the root node and finally the right
subtree.
a. post-order traversal b. in-order traversal c. pre-order traversal d.
None of the above
54 In post-order traversal of a binary tree, the left subtree is processed________
a. First b. Second c. Third d. last
55 In preorder traversal of a binary tree, the ______is processed first, followed by the left
subtree
a. the right subtree b. root node c. Binary tree d. left subtree
56 _________ is a binary tree with one extra property: the key value of each node is greater
than the key values of nodes in each left subtree and smaller than the value of all nodes in
each right subtree
a. Queue b. Stack c. BST d. BTT
57 When a sequential file is updated, the ________ file gets the actual update.
a. New master b. Old master c. the transaction d. the error
report
58 When a sequential file is updated, the ________ file contains a list of all errors occurring
during the update process.
a. New master b. Old master c. the transaction d. the error
report
59 When a sequential file is updated, the ________ file contains the changes to be applied.
a. New master b. Old master c. the transaction d. the error
report
60 If the transaction file key is 20 and the first master file key is 25, then we ________ .
a. add the new record to the new master file b. delete the data
61 If the transaction file key is 20 with a delete code and the master file key is 20, then we
________ .
a. add the new record to the new master file b. delete the data
62 All the members of a record must be _______.
a. The same type b. The integer type c. the related types d. the
character type
63 The _______ level of a three-level DBMS architecture defines the logical view of the data
a. physical b. external c. internal d.
conceptual
64 In the system development process, structure charts are tools used in the _______ phase.
a. analysis b. implementation c. design d.
testing
65 In _______, the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
a. demand paging b. paging c. demand segmentation
d. partitioning
66 In a three-level DBMS architecture, the _______ level determines where data is actually
stored on the storage devices.
a. physical b. external c. internal d.
conceptual
67 In the system development process, writing the program is part of the _______ phase.
a. both black-box and glass box b. glass box c. black box d. neither black
box nor glass box
76 Defining the users, requirements, and methods is part of the _______ phase
a. 4 b. 8 c. 40 d. 32
81 The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.
a. 64 b. 256 c. 32 d. 8
107 If the memory address space is 16 MB and the word size is 8 bits, then________ bits are
needed to access each word
a. 24 b. 16 c. 8 d. 32
108 The data in ________ is erased if the computer is powered down.
a. 24 b. 23 c. 28 d. 216
112 ________ is a type of memory in which the user, not the manufacturer, stores programs
that cannot be overwritten.
a. PROM b. DRAM c. SRAM d.
EPROM
113 The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of
a frame between two adjacent nodes
a. data link b. network c. transport d.
physical
114 The ________ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message
a. fetch, decode, and execute b. data bus, address bus, control bus
c. SCSI, Fire wire, USB d. None of the above
118 A control bus with eight wires can define ________ operations.
a. 64 b. 512 c. 256 d. 32
120 A ________ is a storage device to which the user can write information only once.
a. They were more expensive than tubes but lasted longer and were cooler in temperature.
b. They didn't last as long as tubes but were less expensive.
c. They were cheaper and smaller than tubes.
d. They were cheaper, smaller, and cooler than tubes and lasted longer.
126 DSL speeds range from:
a. 16 b. 32 c. 64 d. 80
132 A ____________ is used as a visual model for describing a program's logical steps
a. 5 b. 4 c. 6 d. 3
147 The ________ construct uses a set of actions one after another.
160 What is the positional value of the 7 in the base 8 number 2715?
a. 16 b.8 c. 64 d.100
161 Which of the following is not one of the basic Boolean operators?
Trang 13