Tài Liệu Final CSI SP23 - 1
Tài Liệu Final CSI SP23 - 1
To search for elements, we can use on sorted arrays that can help to decrease time co
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
A. 256
B. 128
C. 64
D. 512
3. How many connections (in the data bus) do we need to transfer 4 bytes of a word at the sam
A. 4
B. 8
C. 16
D. 32
4. The is a pointer that identifies the next element in the linked list.
A. Link
B. Node
C. Array
D. Data
A. Time-sharing systems
C. Personal systems
D. Parallel systems
6. In the a program is considered a mathematical function. In this context a function is a maps a list of
inputs to a list of outputs
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
A. Memory
B. Process
C. Device
D. File
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
C. Reduced cost
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
11. In the storing audio, if the signal is changing rapidly, we need more samples. It has been sho 40000
samples per second is good enough to reproduce an audio signal.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
12. We can convert a number in any system to decimal. We multiply each digit with its and add the
result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Open-key
14. A process in the state can go to either the ready, terminated, or waiting states.
A. Hold
B. Virtual
C. Running
D. Hold or running
15. The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALU
C. Control unit
D. Store location
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding
a lot of detail
A. Pseudocode
C. Flowchart
D. State diagram
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
20. What is a program of UNIX that accepts requests from users (processes) and interprets ther the
operating system?
A. Software
B. Function
C. SHELL
D. Feature
21. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link
B. Transport
C. Application
D. Physical
22. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link
B. Transport
C. Application
D. Physical
23. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?
24. The term users in a DBMS has a broad meaning. We can divide users into:
A. Delete queue
D. Insert queue
26. One phase in system development is_____
A. Analysis
B. Application
C. Designing
D. Collecting
A. A variable
B. An index
C. A field
D. A node
A. A sequential
B. An indexed
C. A hashed
D. No
29. The unary relation operation always results in a relation that has exactly one more row thar
A. Insert
B. Delete
C. Update
D. Select