0% found this document useful (0 votes)
41 views43 pages

Csi Nokey

The document appears to be a test containing multiple choice questions about computer science topics. It records a test score of 44/46 points. The test questions cover topics such as data representation, computer hardware, operating systems, and networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views43 pages

Csi Nokey

The document appears to be a test containing multiple choice questions about computer science topics. It records a test score of 44/46 points. The test questions cover topics such as data representation, computer hardware, operating systems, and networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

lOMoAR cPSD| 23049225

CSI 104test 1
Total points44/46
CSI 104 test 1
The respondent's email address ( ) was recorded on submission of this form.

In the __ _ graphic method of representing an image in a computer, each pixel is


assigned a bit patterns. *
1/1
a. bitmap

b. vector
c. quantized
d. binary

Which of the following is equivalent to 12 in decimal? *


1/1
a. (1110)2
b. (C)16

c. (15)8
d. None of the above

The precision of the fractional part of a number stored in a computer is defined by the
__ ___. *
1/1
a. sign
b. exponent
c. mantissa

d. last digit

In two’s complement representation with a 4-bit allocation, we get _ ______ when we


add 1 to 7. *
1/1
a. 8
b. 1
c. -7
lOMoAR cPSD| 23049225

d. -8

An image can be represented in a computer using the _ __ method *


1/1
a. bitmap graphic only
b. vector graphic only
c. Excess system only
d. either bitmap or vector graphic

_ ______ operator (s), if the input is two 0s, the output is 0. *


1/1
a. In only AND
b. In only OR
c. In only XOR
d. In AND, OR, or XOR

A step-by-step solution to a problem is called _ __ ...... *


1/1
a. hardware
b. an operating system
c. a computer language
d. an algorithm

The _ ______ method of integer representation is the most common method for storing
integers in computer memory. *
1/1
a. sign-and-magnitude
b. one’s complement
c. two’s complement

d. unsigned integers

Assume a new Excess system uses 17 bits to represent the exponent section. What is
he bias value in this system? *
1/1
lOMoAR cPSD| 23049225

a. 17
b. 16
c. 65535

d. 65536

If we are adding two numbers, one of which has an exponent value of 7 and the other
an exponent value of 9, we need to shift the decimal point of the smaller number
__ ___. *
1/1
a. one place to the left
b. one place to the right
c. two places to the left

d. two places to the right

_ ______ is a logical bit operator. *


1/1
a. The exclusive OR
b. The unary NOT
c. The binary AND
d. exclusive OR, unary NOT, or binary AND

The _ ______ model is the basis for today’s computers


0/1
a. Leibnitz
b. von Neumann
c. Pascal
d. Charles Babbage

A 32-bit code called ____ represents symbols in all languages. *


1/1
a. ANSI
b. Unicode

c. EBCDIC
d. Extended ASCII
lOMoAR cPSD| 23049225

To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then __ ___
the bit pattern and the mask. *
1/1
a. AND
b. OR

c. XOR
d. NOT

A floating-point value after normalization is (1.0101) * 2^-4.What is the value of


exponent section in the Excess-127 representation? *
1/1
a. 4
b. -4
c. 127
d. 123

If the ASCII code for E is 1000101, then the ASCII code for e is _ __ ......Answer the
question without consulting the ASCII table. *
1/1
a. 1000110
b. 1000111
c. 0000110
d. 1100101

In the _ ____ graphic method of representing an image in a computer, the image is


decomposed into a combination of geometrical figures. *
1/1
a. bitmap
b. vector

c. quantized
d. binary

In two’s complement representation with a 4-bit allocation, we get _ ______ when we


add 5 to 5. *
1/1
lOMoAR cPSD| 23049225

a. -5
b. -6

c. -7
d. 10

The unary _____ operator inverts its single input. *


1/1
a. AND
b. OR
c. NOT

d. XOR

For the binary AND operation, only an input of _ __ gives an output of 1 *


1/1
a. two 0s
b. two 1s

c. one 0 and one 1


d. two 2s

One of the first computers based on the von Neumann model was called _ __ ...... *
1/1
a. Pascal
b. Pascaline
c. ABC
d. EDVAC

_ ______ operator (s), if the input is two 1s, the output is 0. *


1/1
a. In only AND
b. In only OR
c. In only XOR

d. In AND, OR, or XOR

In an Excess conversion, we _ ______ the number to be converted. *


1/1
lOMoAR cPSD| 23049225

a. add the bias number to

b. subtract the bias number from


c. multiply the bias number by
d. divide the bias number by

The first electronic special-purpose computer was called _ __ .*


1/1
a. Pascal
b. Pascaline
c. ABC

d. ENIAC

_ ______ is a set of instructions in a computer language that tells the computer what to
do with data. *
1/1
a. An operating system
b. An algorithm
c. A data processor
d. A program

For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement form is ___ _. *
1/1
a. 8
b. 127

c. 128
d. 256

How many symbols can be represented by a bit pattern with ten bits? *
1/1
a. 128
b. 256
c. 512
d. 1024
lOMoAR cPSD| 23049225

To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then
_ ______ the bit pattern and the mask. *
1/1
a. AND

b. OR
c. XOR
d. NOT

_ ______ separated the programming task from computer operation tasks. *


1/1
a. Algorithms
b. Data processors
c. High-level programming languages

d. Operating systems

_ ______ is the design and writing of a program in structured form. *


1/1
a. Software engineering

b. Hardware engineering
c. Algorithm development
d. Instructional architecture

Which of the following is equivalent to 24 in decimal? *


1/1
a. (11000)2

b. (1A)16
c. (31)8
d. None of the above

In two’s complement addition, if there is a final carry after the left most column
addition, _ ______. *
1/1
a. add it to the right most column
b. add it to the left most column
c. discard it
lOMoAR cPSD| 23049225

d. increase the bit length

We use a bit pattern called a _ ______ to modify another bit pattern. *


1/1
a. mask

b. carry
c. float
d. byte

In the _ ____ graphic method of representing an image in a computer, re-scaling of


the image creates a ragged or grainy image. *
1/1
a. bitmap

b. vector
c. quantized
d. binary

For an 8-bit allocation, the smallest decimal number that can be represented in two’s
complement form is ___ _. *
1/1
a. -8
b. -127
c. -128

d. -256

Which number representation method is often used to store the exponential value of a
fractional part? *
1/1
a. unsigned integers
b. two’s complement
c. Excess

d. ten’s complement
lOMoAR cPSD| 23049225

In a computer, the _ _______ subsystem serves as a manager of the other


subsystems. *
1/1
a. ALU
b. input/output
c. memory
d. control unit

_ ______ is an arithmetic operation. *


1/1
a. The exclusive OR
b. The unary NOT
c. Subtraction

d. The binary AND

According to the von Neumann model, _ __ are stored in memory *


1/1
a. only data
b. only programs
c. data and programs

d. neither data nor programs

When a fractional part is normalized, the computer stores the _______ _. *


1/1
a. only the sign
b. only the exponent
c. only the mantissa
d. the sign, exponent, and mantissa

If the exponent in Excess_127 is binary 10000101, the exponent in decimal is


__ ___. *
1/1
a. 6

b. 7
lOMoAR cPSD| 23049225

c. 8
d. 9

To flip all the bits of a bit pattern, make a mask of all 1s and then _____ the bit
pattern and the mask. *
1/1
a. AND
b. OR
c. XOR

d. NOT

The first computing machine to use the idea of storage and programming was called
__ ___. *
1/1
b. EDVAC
c. the Babbage machine
d. the Jacquard loom

a. the Madeline

In a computer, the _ _______ subsystem performs calculations and logical opera-tions. *


1/1
a. ALU

b. input/output
c. memory
Tùy chọn 4

The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the __ _ _____ representation. *
0/1
a. unsigned
b. sign-and-magnitude
c. two’s complement

d. one’s complement
lOMoAR cPSD| 23049225

In a computer, the _ _______ subsystem accepts data and programs and sends pro-
cessing results to output devices. *
1/1
a. ALU
b. input/output

c. memory
d. control unit
This form was created inside FPT University.

CSI 104 test 2


Total points45/46

CSI 104 test 2


The respondent's email address ( ) was recorded on submission of this form.

What is the domain name in the e mail address [email protected]? *


1/1
a. kayla
b. [email protected]
c. nasa.gov

d. gov

The _ ______ layer of the TCP/IP protocol suite is responsible for node-to-node
delivery of a frame between two adjacent nodes. *
1/1
a. transport
b. network
c. data-link

d. session

To prevent _ ___ , an operating system can put resource restrictions on process-


es *
1/1
a. starvation
lOMoAR cPSD| 23049225

b. synchronization
c. paging
d. deadlock

The _ ______ layer of the TCP/IP protocol suite provides services for end users. *
1/1
a. data-link
b. transport
c. application

d. physical

_ ______ is a memory type with capacitors that need to be refreshed periodically. *


1/1
a. SRAM
b. DRAM

c. ROM
d. CROM

If the memory address space is 16 MB and the word size is 8 bits, then _ ____ bits
are needed to access each word. *
1/1
8
16
24

32

The _ ______ scheduler creates a process from a job and changes a process back to
a job. *
1/1
The ________ scheduler creates a process from a job and changes a process back to a job.
a. job

b. process
c. virtual
d. queue
lOMoAR cPSD| 23049225

In paging, a program is divided into equally sized sections called _ _____ _. *


1/1
a. pages

b. frames
c. segments
d. partitions

A program becomes a _ ____ when it is selected by the operating system and


brought to the hold state. *
1/1
a. job

b. process
c. deadlock
d. partition

__ ___ is a protocol for accessing and transferring documents on the WWW *


1/1
a. FTP
b. SMTP
c. TELNET
d. HTTP

_ ______ can occur if a process has too many resource restrictions. *


1/1
a. Starvation

b. Synchronization
c. Paging
d. Deadlock

_ ______ is a memory type with traditional flip-flop gates to hold data. *


1/1
a. SRAM
lOMoAR cPSD| 23049225

b. DRAM
c. ROM
d. CROM

In ________ , the program can be divided into differently sized sections. *


1/1
a. partitioning
b. paging
c. demand paging
d. demand segmentation

A _____ is a storage device that can undergo multiple writes and erasures. *
1/1
a. CD-ROM
b. CD-R
c. CD-RW

d. CD-RR

_ ______ supervises the activity of each component in a computer system. *


1/1
a. An operating system

b. Hardware
c. A queue
d. An application program

A register in a CPU can hold _ __ ...... *


1/1
a. only data
b. only instructions
c. only program counter values
d. data, instruction, or program counter values

The _ ______ is a computer subsystem that performs operations on data.


1/1
lOMoAR cPSD| 23049225

a. CPU

b. memory
c. I/O hardware
d. bus subsystem

A process in the ready state goes to the running state when ______ _. *
1/1
a. it enters memory
b. it requests I/O
c. it gets access to the CPU

d. it finishes running

A _____ is a storage device to which the user can write information only once. *
1/1
a. CD-ROM
b. CD-R

c. CD-RW
d. CD-RR

In ________ , the program can be divided into equally sized sections called pages, but
the pages need not be in memory at the same time for execution. *
1/1
a. partitioning
b. paging
c. demand paging

d. demand segmentation

The _ ______ manager is responsible for access to I/O devices. *


1/1
a. memory
b. process
c. device

d. file
lOMoAR cPSD| 23049225

In _ __, only one program can reside in memory for execution *


1/1
a. mono-programming

b. multi-programming
c. partitioning
d. paging

Which physical topology uses a hub or switch? *


1/1
a. bus
b. ring
c. star

d. bus and ring

The smallest storage area on a magnetic disk that can be accessed at one time is a *
1/1
a. track
b. sector

c. frame
d. head

_ ______ protocol (s) is one of the protocols in the transport layer. *


···/1
a. Only TCP

b. Only UDP
c. Only SCTP
d. TCP, UDP, and SCTP

_ ______ is multi-programming with swapping *


1/1
a. Partitioning
b. Paging
c. Demand paging

d. Queuing
lOMoAR cPSD| 23049225

_ _____ is a program that facilitates the execution of other programs. *


1/1
a. An operating system

b. Hardware
c. A queue
d. An application program

_ ______ is multi-programming without swapping. *


1/1
a. Partitioning

b. Virtual memory
c. Demand paging
d. Queuing

Multi-programming requires a __ ___ operating-system *


1/1
a. batch
b. time-sharing

c. parallel
d. distributed

IP addresses are currently __ ___ bits in length *


1/1
4
8
32

40

Main memory in a computer usually consists of large amounts of _______ speed


memory. *
1/1
a. high
b. medium
c. low
lOMoAR cPSD| 23049225

d. very high speed

The _ ______ manager is responsible for archiving and backup. *


1/1
a. memory
b. process
c. device
d. file

A control bus with eight wires can define __ ___ operations *


1/1
a. 8
b. 16
c. 256

d. 512

In the _ ____ method for synchronizing the operation of the CPU with an I/O device,
the CPU is idle until the I/O operation is finished. *
1/1
a. programmed I/O

b. interrupt-driven I/O
c. DMA
d. isolated I/O

A_ __ controller is a high-speed serial interface that transfers data in packets *


1/1
a. SCSI
b. USB
c. FireWire
d. USB and FireWire

In the _ ____ method for synchronizing the operation of the CPU with an I/O device,
the I/O device informs the CPU when it is ready for data transfer *
lOMoAR cPSD| 23049225

1/1
a. programmed I/O
b. interrupt-driven I/O

c. DMA
d. isolated I/O

_ ______ can be programmed and erased using electronic impulses but can remain in
a computer during erasure. *
1/1
a. ROM
b. PROM
c. EPROM
d. EEPROM

v_ ______ is a multi-programming method in which multiple programs are entirely in


memory with each program occupying a contiguous space. *
1/1
a. Partitioning

b. Paging
c. Demand paging
d. Demand segmentation

A control unit with five wires can define up to _____ operations. *


1/1
5
10
16
32

_ ______ is a unit that can add two inputs. *


1/1
a. An ALU

b. A register
c. A control unit
lOMoAR cPSD| 23049225

d. A tape drive

A word can be _____ bits. *


1/1
a. only 8
b. only 16
c. only 32
d. 8, or 16, or 32

_ ______ is a type of memory in which the user, not the manufacturer, stores pro-
grams that cannot be overwritten. *
1/1
a. ROM
b. PROM

c. EPROM
d. EEPROM

The three steps in the running of a program on a computer are performed in the
specific order _ _____ _. *
1/1
a. fetch, execute, and decode
b. decode, execute, and fetch
c. fetch, decode, and execute

d. decode, fetch, and execute

is a stand-alone storage location that holds data temporarily. *


1/1
a. An ALU
b. A register

c. A control unit
d. A tape drive

The _ ______ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message. *
lOMoAR cPSD| 23049225

1/1
a. transport
b. network

c. data-link
d. session

A process in the ________ state can go to either the ready, terminated, or waiting
states. *
1/1
a. hold
b. virtual
c. running

d. hold or running

CSI 104 TEST 3


Total points48/49

CSI 104 TEST 3


The respondent's email address ( ) was recorded on submission of this form.

Each element in a record is called ____ _. *


1/1
a. a variable
b. an index
c. a field

d. a node

All the members of a record must be _ __...... *


1/1
a. the same type
b. related types

c. integer type
d. character type
lOMoAR cPSD| 23049225

_ ______ is an ordered collection of data in which each element contains the loca-tion
of the next element. *
1/1
a. An array
b. A record
c. A linked list

d. A file

In a linked list, each element contains _ _____ _. *


1/1
a. only data
b. only a link
c. neither data nor a link
d. data and a link

The _ ______ is a pointer that identifies the next element in the linked list. *
1/1
a. link

b. node
c. array
d. data

Given a linked list called children, the pointer variable children identifies __ __
element of the linked list. *
1/1
a. the first

b. the second
c. the last
d. any

To traverse a list, you need a ______pointer. *


1/1
a. null
lOMoAR cPSD| 23049225

b. walking

c. beginning
d. insertion

In an abstract data type, _ __ .*


1/1
a. the ADT implementation is known
b. the ADT implementation is hidden

c. the ADT public operations are hidden


d. Nothing is hidden

_ ______ is a step-by-step method for solving a problem or doing a task. *


1/1
a. A construct
b. A recursion
c. An iteration
d. An algorithm

There are _______ basic constructs in computer -science. *


1/1
1
2
3

The _ _____ construct tests a condition. *


1/1
a. sequence
b. decision

c. repetition
d. flow

_ ______ is a pictorial representation of an algorithm. *


1/1
lOMoAR cPSD| 23049225

a. A UML diagram

b. A program
c. Pseudocode
d. An algorithm

_ ______ is an English-language-like representation of code. *


1/1
a. A UML diagram
b. A program
c. Pseudocode

d. An algorithm

In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list. *
1/1
a. selection
b. bubble
c. insertion

d. every

In ________ sort, the smallest item from the unsorted list is swapped with the item at
the beginning of the unsorted list. *
1/1
a. selection

b. bubble
c. insertion
d. every

*
1/1
In _______ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-
one swapping.
a. selection
b. bubble

c. insertion
lOMoAR cPSD| 23049225

d. every

_ ______ is a basic algorithm in which we want to find the location of a target in a list of
items. *
1/1
a. Sorting
b. Searching

c. Product
d. Summation

We use a _ ______ search for an unordered list. *


1/1
a. sequential

b. binary
c. bubble
d. insertion

We use a _ ______ search for an ordered list. *


1/1
a. sequential
b. binary

c. bubble
d. insertion

18. __ ___ is a process in which an algorithm calls itself *


1/1
a. Insertion
b. Searching
c. Recursion

d. Iteration

The only language understood by computer hardware is a _________language. *


1/1
a. machine
lOMoAR cPSD| 23049225

b. symbolic
c. high-level
d. natural

C, C++, and Java can be classified as _____ languages. *


1/1
a. machine
b. symbolic
c. high-level

d. natural

FORTRAN is a(n) _ _______language. *


1/1
a. procedural

b. functional
c. declarative
d. object-oriented

Pascal is a(n) ________ language. *


1/1
a. procedural

b. functional
c. declarative
d. object-oriented

Java is a(n) _ ____ language. *


1/1
a. procedural
b. functional
c. declarative
d. object-oriented

LISP is a(n) _ ______ language. *


1/1
lOMoAR cPSD| 23049225

a. procedural
b. functional

c. declarative
d. object-oriented

_ ______ is a common language in the business -environment. *


1/1
a. FORTRAN
b. C++
c. C
d. COBOL

_ ______ is a popular object-oriented language. *


1/1
a. FORTRAN
b. COBOL
c. Java

d. LISP

A _____ program can be either an application or an applet. *


1/1
a. FORTRAN
b. C++
c. C
d. Java

LISP and Scheme are both _ _______ languages. *


1/1
a. procedural
b. functional

d. object-oriented
c. declarative

Prolog is an example of a(n) _ __ language *


lOMoAR cPSD| 23049225

1/1
a. procedural
b. functional
c. declarative

d. object-oriented

One phase in system development is ______ _. *


1/1
a. analysis

b. application
c. designing
d. collecting

Defining the users, requirements, and methods is part of the _ _______ phase. *
1/1
a. analysis

b. design
c. implementation
d. testing

In the system development process, writing the program is part of the _____
phase. *
1/1
a. analysis
b. design
c. implementation

d. testing

In the system development process, structure charts are tools used in the __ ___
phase. *
1/1
a. analysis
b. design

c. implementation
lOMoAR cPSD| 23049225

d. testing

If A is the first data element input into a stack, followed by B, C, and D, then __ ___
is the first element to be removed. *
1/1
A
B
C
D

Testing a software system can involve _ ____ testing. *


1/1
a. black-box
b. glass-box
c. neither black-box nor glass-box
d. both black-box and glass-box

_ ______ is the breaking up of a large project into smaller parts. *


1/1
a. Coupling
b. Incrementing
c. Obsolescence
d. Modularization

_ ______ is a measure of how tightly two modules are bound to each other. *
1/1
a. Modularity
b. Coupling

c. Interoperability
d. Cohesion

__ __ _between modules in a software system must be minimized. *


1/1
a. Coupling
lOMoAR cPSD| 23049225

b. Cohesion
c. Neither coupling nor cohesion
d. Both coupling and cohesion

__ __ _between modules in a software system must be maximized. *


···/1
a. Coupling
b. Cohesion

c. Neither coupling nor cohesion


d. Both coupling and cohesion

No correct answers

If A is the first data element input into a queue, followed by B, C, and D, then _____
is the first element to be removed. *
1/1
A

B
C
D

The pop operation _ ____ of the stack. *


1/1
a. deletes an item from the top

b. deletes an item from the bottom


c. inserts an item at the top
d. inserts an item at the bottom

The push operation _ ____ of the stack. *


1/1
a. deletes an item from the top
b. deletes an item from the bottom
c. inserts an item at the top

d. inserts an item at the bottom


lOMoAR cPSD| 23049225

In a binary tree, each node has _ _______ two subtrees. *


1/1
a. more than
b. less than
c. at most

d. at least

In preorder traversal of a binary tree, the __.......*


1/1
a. left subtree is processed first
b. right subtree is processed first
c. root is processed first

d. the root is never processed

In postorder traversal of a binary tree, the root is processed _ _____ _. *


1/1
a. first
b. second
c. last

d. after the left subtree

In postorder traversal of a binary tree, the left subtree is processed _ _____ _. *


1/1
a. first

b. second
c. last
d. after the right subtree

In ________ traversal of a binary tree, the left subtree is processed last. *


a. preorder
b. inorder
c. postorder
d. out of order

In an inorder traversal of a binary tree, the root is processed ____ _. *


lOMoAR cPSD| 23049225

1/1
a. first
b. second

c. last
d. two times

This form was created inside FPT University.

CSI 104 TEST 4


Total points43/50
CSI 104 TEST 4
The respondent's email address ( ) was recorded on submission of this form.

__ __ _ ____ means concealing the message by covering it with something else. *


1/1
a. Cryptography
b. Steganography

c. Compressing
d. Authentication

In _ _ ___ cryptography, the same key is used by the sender and the receiver. *
1/1
a. symmetric-key

b. asymmetric-key
c. public-key
d. open-key

In _______ cryptography, the same key is used in both directions. *


1/1
a. symmetric-key

b. asymmetric-key
c. public-key
d. open-key
lOMoAR cPSD| 23049225

__ __ _ cryptography is often used for long messages. *


1/1
a. Symmetric-key

b. Asymmetric-key
c. Public-key
d. Open-key

__ _ ______ cryptography is often used for short messages. *


1/1
a. Symmetric-key
b. Asymmetric-key

c. Secret-key
d. Open-key

__ _ _____ means that the sender and the receiver expect confidentiality. *
1/1
a. Nonrepudiation
b. Integrity
c. Authentication
d. encryption and decryption

_ ______ file can be accessed randomly. *


1/1
a. A sequential
b. An indexed
c. A hashed
d. Any

When a sequential file is updated, the _______ file gets the actual update. *
1/1
a. new master

b. old master
c. transaction
lOMoAR cPSD| 23049225

d. error report

When a sequential file is updated, the _______ file contains the changes to be ap-
plied. *
2/2
a. new master
b. old master
c. transaction

d. error report

If the transaction file key is 20 and the first master file key is 25, then we ___ _. *
1/1
If the transaction file key is 20 and the first master file key is 25, then we _______ _.
a. add the new record to the new master file

b. revise the contents of the old master file


c. delete the data
d. write the old master file record to the new master file

If the transaction file key is 20 with a delete code and the master file key is 20, then
we _ __ ...... *
1/1
a. add the transaction to the new master file
b. revise the contents of the old master file
c. delete the data

d. write the old master file record to the new master file

An indexed file consists of _ __ ...... *


1/1
a. only a sequential data file
b. only an index
c. only a random data file
d. an index and random data file

The index of an indexed file has _ ______ fields. *


lOMoAR cPSD| 23049225

1/1
a. two

b. three
c. four
d. any number of

In the __ _ hashing method, selected digits are extracted from the key and used
as the address. *
1/1
a. direct
b. division remainder
c. modulo division
d. digit extraction

In the __ _ hashing method, the key is divided by the file size, and the address is
the remainder plus 1. *
1/1
a. direct
b. modulo division

c. division remainder
d. digit extraction

*
1/1
In the ________ hashing method, there are no synonyms or collisions.
a. direct

b. modulo division
c. division remainder
d. digit extraction

_ ______ are keys that hash to the same location in the data file. *
1/1
a. Collisions
b. Buckets
c. Synonyms
lOMoAR cPSD| 23049225

d. Linked lists

When a hashing algorithm produces an address for an insertion key and that ad-dress
is already occupied, it is called a ______ _. *
1/1
a. collision

b. probe
c. synonym
d. linked list

The address produced by a hashing algorithm is the ________ address. *


1/1
a. probe
b. synonym
c. collision
d. home

The _ ______ area is the file area that contains all the home addresses. *
1/1
a. probe
b. linked
c. hash
d. prime

In the ____ collision resolution method, we try to put data that cannot be placed in
location 123 into location 124. *
1/1
a. open addressing

b. linked list
c. bucket hashing
d. random hashing
lOMoAR cPSD| 23049225

In a three-level DBMS architecture, the layer that interacts directly with the hardware
is the _ ______ level. *
1/1
a. external
b. conceptual
c. internal

d. physical

In a three-level DBMS architecture, the _ _______ level determines where data is


actually stored on the storage devices. *
1/1
a. external
b. conceptual
c. internal

d. physical

The _ ______ level of a three-level DBMS architecture defines the logical view of the
data. *
1/1
a. external
b. conceptual

c. internal
d. physical

The data model and the schema of a DBMS are often defined at the _____ lev-el. *
1/1
a. external
b. conceptual

c. internal
d. physical

In a three-level DBMS architecture, the _ _______ level interacts directly with the
users. *
1/1
lOMoAR cPSD| 23049225

a. external

b. conceptual
c. internal
d. physical

Of the various database models, the ________ model is the most prevalent today. *
1/1
a. hierarchical
b. network
c. relational

d. linked list

Each column in a relation is called _ __...... *


1/1
a. an attribute

b. a tuple
c. a union
Tùy chọn 4

8. Each row in a relation is called _ __...... *


1/1
a. an attribute
b. a tuple

c. a union
d. an attitude

A unary operator is applied to __ _ relation(s) and creates an output of _ __ _


relation(s). *
0/1
a. one, one
b. one, two

c. two, one
d. two, two
lOMoAR cPSD| 23049225

A binary operator is applied to ________ relations (s) and creates an output of


_ ____ relation(s). *
1/1
a. one, one
b. one, two
c. two, one

d. two, two

The unary _____ operation always results in a relation that has exactly one more
row than the original relation. *
1/1
a. insert

b. delete
c. update
d. select

If you want to change the value of an attribute of a tuple, you use the _ ______ op-
eration. *
1/1
a. project
b. join
c. update

d. select

If you need to delete an attribute in a relation, you can use the _ ____ operation. *
1/1
a. join
b. project

c. union
d. intersection

You want to create a relation called New that contains tuples that belong to both
relation A and relation B. For this, you can use the _____ operation. *
1/1
lOMoAR cPSD| 23049225

a. select
b. union
c. project
d. intersection

Which of the following is a unary operator? *


1/1
a. intersection
b. union
c. join
d. project

Which of the following is a binary operator? *


0/1
a. select
b. update
c. difference
d. all of the above

_ ______ is a declarative language used on relational databases. *


1/1
a. PDQ
b. SQL

c. LES
d. PBJ

Three security goals are ____ _. *


0/1
a. confidentiality, cryptography, and nonrepudiation

b. confidentiality, encryption, and decryption


c. confidentiality, integrity, and availability
d. confidentiality, denial of service, and masquerading

Which of the following attacks is threatening integrity? *


lOMoAR cPSD| 23049225

1/1
a. Masquerading

b. Traffic Analysis
c. Denial of service
d. Encoding

Which of the following attacks is threatening availability? *


0/1
a. Replaying

b. Modification
c. Denial of service
d. Decoding

__ __ __ _ means concealing the contents of a message by enciphering. *


0/1
a. Steganography

b. Cryptography
c. Compressing
d. Authentication

__ _ ______ means that the data must arrive at the receiver exactly as they were
sent. *
0/1
a. Nonrepudiation

b. Message integrity
c. Authentication
d. Secrecy

__ __ _ _____ can provide authentication, integrity, and nonrepudiation for a


message. *
1/1
a. Encryption/decryption
b. Digital signature

c. Compression
lOMoAR cPSD| 23049225

d. Key-exchange

In _ _ ____ , the identity of a party is verified once for the entire duration of
system access. *
0/1
a. entity authentication
b. message integrity
c. message authentication

d. message encryption

In _ _ ____ cryptography, everyone has access to everyone’s public key. *


1/1
a. symmetric-key
b. asymmetric-key

c. secret-key
d. private-key

In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known? *
1/1
a. encryption key only
b. decryption key only

c. both encryption and decryption keys


d. neither encryption key nor decryption key

The RSA algorithm for confidentiality uses ________ cryptography. *


1/1
a. asymmetric-key

b. symmetric-key
c. substitution
d. transposition

In RSA, if user A wants to send an encrypted message to user B, the plaintext is


encrypted with the public key of _ __ ......*
lOMoAR cPSD| 23049225

1/1
a. user A
b. user B

c. the network
d. a third party.

You might also like