0% found this document useful (0 votes)
17 views6 pages

Tài Liệu Final CSI SP23 - 1

This document contains a set of multiple choice questions about various topics in computer science including algorithms, data representation, operating systems, cryptography, databases and more. There are 29 questions in total with options for each answer.

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

Tài Liệu Final CSI SP23 - 1

This document contains a set of multiple choice questions about various topics in computer science including algorithms, data representation, operating systems, cryptography, databases and more. There are 29 questions in total with options for each answer.

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

To search for elements, we can use on sorted arrays that can help to decrease time co

A. Sequential search

B. Insertion sort

C. Selection sort

D. Binary search

2. What is the number of bit patterns provided by a 7-bit code?

A. 256

B. 128

C. 64

D. 512

E. None of the others

3. How many connections (in the data bus) do we need to transfer 4 bytes of a word at the sam

A. 4

B. 8

C. 16

D. 32

4. The is a pointer that identifies the next element in the linked list.

A. Link

B. Node

C. Array

D. Data

5. _____were designed in the 1950s to control mainframe computers

A. Time-sharing systems

B. Batch operating system

C. Personal systems

D. Parallel systems
6. In the a program is considered a mathematical function. In this context a function is a maps a list of
inputs to a list of outputs

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

7. The manager is responsible for archiving and backup.

A. Memory

B. Process

C. Device

D. File

8. Instructions and memory addresses are represented by

A. Character codes

B. Binary codes

C. Binary word

D. Parity bit

E. None of the others

9. Most important advantage of an IC is its

A. Easy replacement in case of circuit failure

B. Extremely high reliability

C. Reduced cost

D. Low power consumption

E. None of the others

10. Thedeals with active objects instead of passive objects

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm
11. In the storing audio, if the signal is changing rapidly, we need more samples. It has been sho 40000
samples per second is good enough to reproduce an audio signal.

A. Quantization

B. Sampling rate

C. Encoding

D. Bit depth

12. We can convert a number in any system to decimal. We multiply each digit with its and add the
result to get the number in the decimal system.

A. Numbers

B. Values

C. Place value

D. None of others

13._________ cryptography is often used for short messages.

A. Symmetric-key

B. Asymmetric-key

C. Secret-key

D. Open-key

14. A process in the state can go to either the ready, terminated, or waiting states.

A. Hold

B. Virtual

C. Running

D. Hold or running

15. The basic unit within a computer store capable of holding a single unit of data is

A. Register

B. ALU

C. Control unit

D. Store location

E. None of the others


16. Which of the following attacks is threatening integrity?

A. Masquerading

B. Traffic Analysis

C. Denial of service

D. Encoding

17. ______is an English-language-like representation of an algorithm. There is no standard for it-

a lot of detail

A. Pseudocode

B. Unified Modeling Language (UML)

C. Flowchart

D. State diagram

18. The ASCII code for the character J is:

A. 1001 0001

B. 1001 1010

C. 0100 1010

D. 1010 0001

E. None of the others

19. The pop operation of the stack.

A. Deletes an item from the top

B. Deletes an item from the bottom

C. Inserts an item at the top

D. Inserts an item at the bottom

20. What is a program of UNIX that accepts requests from users (processes) and interprets ther the
operating system?

A. Software

B. Function

C. SHELL

D. Feature
21. The layer of the TCP/IP protocol suite provides services for end users.

A. Data-link

B. Transport

C. Application

D. Physical

22. The layer of the TCP/IP protocol suite provides services for end users.

A. Data-link

B. Transport

C. Application

D. Physical

23. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?

A. Encryption key only

B. Decryption key only

C. Both encryption and decryption keys

D. Neither encryption key nor decryption key

24. The term users in a DBMS has a broad meaning. We can divide users into:

A. End users and database asministrators

B. End users and normal users

C. Application programs and end users

D. Application programs and database adminitrators

25. The queue operation: "queue (queueName)" is used to

A. Delete queue

B. Check status of queue

C. Create an empty queue

D. Insert queue
26. One phase in system development is_____

A. Analysis

B. Application

C. Designing

D. Collecting

27. Each element in a record is called

A. A variable

B. An index

C. A field

D. A node

28.________ file can be accessed sequentially.

A. A sequential

B. An indexed

C. A hashed

D. No

29. The unary relation operation always results in a relation that has exactly one more row thar

A. Insert

B. Delete

C. Update

D. Select

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy