Csi Nokey
Csi Nokey
CSI 104test 1
Total points44/46
CSI 104 test 1
The respondent's email address ( ) was recorded on submission of this form.
b. vector
c. quantized
d. binary
c. (15)8
d. None of the above
The precision of the fractional part of a number stored in a computer is defined by the
__ ___. *
1/1
a. sign
b. exponent
c. mantissa
d. last digit
d. -8
The _ ______ method of integer representation is the most common method for storing
integers in computer memory. *
1/1
a. sign-and-magnitude
b. one’s complement
c. two’s complement
d. unsigned integers
Assume a new Excess system uses 17 bits to represent the exponent section. What is
he bias value in this system? *
1/1
lOMoAR cPSD| 23049225
a. 17
b. 16
c. 65535
d. 65536
If we are adding two numbers, one of which has an exponent value of 7 and the other
an exponent value of 9, we need to shift the decimal point of the smaller number
__ ___. *
1/1
a. one place to the left
b. one place to the right
c. two places to the left
c. EBCDIC
d. Extended ASCII
lOMoAR cPSD| 23049225
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then __ ___
the bit pattern and the mask. *
1/1
a. AND
b. OR
c. XOR
d. NOT
If the ASCII code for E is 1000101, then the ASCII code for e is _ __ ......Answer the
question without consulting the ASCII table. *
1/1
a. 1000110
b. 1000111
c. 0000110
d. 1100101
c. quantized
d. binary
a. -5
b. -6
c. -7
d. 10
d. XOR
One of the first computers based on the von Neumann model was called _ __ ...... *
1/1
a. Pascal
b. Pascaline
c. ABC
d. EDVAC
d. ENIAC
_ ______ is a set of instructions in a computer language that tells the computer what to
do with data. *
1/1
a. An operating system
b. An algorithm
c. A data processor
d. A program
For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement form is ___ _. *
1/1
a. 8
b. 127
c. 128
d. 256
How many symbols can be represented by a bit pattern with ten bits? *
1/1
a. 128
b. 256
c. 512
d. 1024
lOMoAR cPSD| 23049225
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then
_ ______ the bit pattern and the mask. *
1/1
a. AND
b. OR
c. XOR
d. NOT
d. Operating systems
b. Hardware engineering
c. Algorithm development
d. Instructional architecture
b. (1A)16
c. (31)8
d. None of the above
In two’s complement addition, if there is a final carry after the left most column
addition, _ ______. *
1/1
a. add it to the right most column
b. add it to the left most column
c. discard it
lOMoAR cPSD| 23049225
b. carry
c. float
d. byte
b. vector
c. quantized
d. binary
For an 8-bit allocation, the smallest decimal number that can be represented in two’s
complement form is ___ _. *
1/1
a. -8
b. -127
c. -128
d. -256
Which number representation method is often used to store the exponential value of a
fractional part? *
1/1
a. unsigned integers
b. two’s complement
c. Excess
d. ten’s complement
lOMoAR cPSD| 23049225
b. 7
lOMoAR cPSD| 23049225
c. 8
d. 9
To flip all the bits of a bit pattern, make a mask of all 1s and then _____ the bit
pattern and the mask. *
1/1
a. AND
b. OR
c. XOR
d. NOT
The first computing machine to use the idea of storage and programming was called
__ ___. *
1/1
b. EDVAC
c. the Babbage machine
d. the Jacquard loom
a. the Madeline
b. input/output
c. memory
Tùy chọn 4
The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the __ _ _____ representation. *
0/1
a. unsigned
b. sign-and-magnitude
c. two’s complement
d. one’s complement
lOMoAR cPSD| 23049225
In a computer, the _ _______ subsystem accepts data and programs and sends pro-
cessing results to output devices. *
1/1
a. ALU
b. input/output
c. memory
d. control unit
This form was created inside FPT University.
d. gov
The _ ______ layer of the TCP/IP protocol suite is responsible for node-to-node
delivery of a frame between two adjacent nodes. *
1/1
a. transport
b. network
c. data-link
d. session
b. synchronization
c. paging
d. deadlock
The _ ______ layer of the TCP/IP protocol suite provides services for end users. *
1/1
a. data-link
b. transport
c. application
d. physical
c. ROM
d. CROM
If the memory address space is 16 MB and the word size is 8 bits, then _ ____ bits
are needed to access each word. *
1/1
8
16
24
32
The _ ______ scheduler creates a process from a job and changes a process back to
a job. *
1/1
The ________ scheduler creates a process from a job and changes a process back to a job.
a. job
b. process
c. virtual
d. queue
lOMoAR cPSD| 23049225
b. frames
c. segments
d. partitions
b. process
c. deadlock
d. partition
b. Synchronization
c. Paging
d. Deadlock
b. DRAM
c. ROM
d. CROM
A _____ is a storage device that can undergo multiple writes and erasures. *
1/1
a. CD-ROM
b. CD-R
c. CD-RW
d. CD-RR
b. Hardware
c. A queue
d. An application program
a. CPU
b. memory
c. I/O hardware
d. bus subsystem
A process in the ready state goes to the running state when ______ _. *
1/1
a. it enters memory
b. it requests I/O
c. it gets access to the CPU
d. it finishes running
A _____ is a storage device to which the user can write information only once. *
1/1
a. CD-ROM
b. CD-R
c. CD-RW
d. CD-RR
In ________ , the program can be divided into equally sized sections called pages, but
the pages need not be in memory at the same time for execution. *
1/1
a. partitioning
b. paging
c. demand paging
d. demand segmentation
d. file
lOMoAR cPSD| 23049225
b. multi-programming
c. partitioning
d. paging
The smallest storage area on a magnetic disk that can be accessed at one time is a *
1/1
a. track
b. sector
c. frame
d. head
b. Only UDP
c. Only SCTP
d. TCP, UDP, and SCTP
d. Queuing
lOMoAR cPSD| 23049225
b. Hardware
c. A queue
d. An application program
b. Virtual memory
c. Demand paging
d. Queuing
c. parallel
d. distributed
40
d. 512
In the _ ____ method for synchronizing the operation of the CPU with an I/O device,
the CPU is idle until the I/O operation is finished. *
1/1
a. programmed I/O
b. interrupt-driven I/O
c. DMA
d. isolated I/O
In the _ ____ method for synchronizing the operation of the CPU with an I/O device,
the I/O device informs the CPU when it is ready for data transfer *
lOMoAR cPSD| 23049225
1/1
a. programmed I/O
b. interrupt-driven I/O
c. DMA
d. isolated I/O
_ ______ can be programmed and erased using electronic impulses but can remain in
a computer during erasure. *
1/1
a. ROM
b. PROM
c. EPROM
d. EEPROM
b. Paging
c. Demand paging
d. Demand segmentation
b. A register
c. A control unit
lOMoAR cPSD| 23049225
d. A tape drive
_ ______ is a type of memory in which the user, not the manufacturer, stores pro-
grams that cannot be overwritten. *
1/1
a. ROM
b. PROM
c. EPROM
d. EEPROM
The three steps in the running of a program on a computer are performed in the
specific order _ _____ _. *
1/1
a. fetch, execute, and decode
b. decode, execute, and fetch
c. fetch, decode, and execute
c. A control unit
d. A tape drive
The _ ______ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message. *
lOMoAR cPSD| 23049225
1/1
a. transport
b. network
c. data-link
d. session
A process in the ________ state can go to either the ready, terminated, or waiting
states. *
1/1
a. hold
b. virtual
c. running
d. hold or running
d. a node
c. integer type
d. character type
lOMoAR cPSD| 23049225
_ ______ is an ordered collection of data in which each element contains the loca-tion
of the next element. *
1/1
a. An array
b. A record
c. A linked list
d. A file
The _ ______ is a pointer that identifies the next element in the linked list. *
1/1
a. link
b. node
c. array
d. data
Given a linked list called children, the pointer variable children identifies __ __
element of the linked list. *
1/1
a. the first
b. the second
c. the last
d. any
b. walking
c. beginning
d. insertion
c. repetition
d. flow
a. A UML diagram
b. A program
c. Pseudocode
d. An algorithm
d. An algorithm
In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list. *
1/1
a. selection
b. bubble
c. insertion
d. every
In ________ sort, the smallest item from the unsorted list is swapped with the item at
the beginning of the unsorted list. *
1/1
a. selection
b. bubble
c. insertion
d. every
*
1/1
In _______ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-
one swapping.
a. selection
b. bubble
c. insertion
lOMoAR cPSD| 23049225
d. every
_ ______ is a basic algorithm in which we want to find the location of a target in a list of
items. *
1/1
a. Sorting
b. Searching
c. Product
d. Summation
b. binary
c. bubble
d. insertion
c. bubble
d. insertion
d. Iteration
b. symbolic
c. high-level
d. natural
d. natural
b. functional
c. declarative
d. object-oriented
b. functional
c. declarative
d. object-oriented
a. procedural
b. functional
c. declarative
d. object-oriented
d. LISP
d. object-oriented
c. declarative
1/1
a. procedural
b. functional
c. declarative
d. object-oriented
b. application
c. designing
d. collecting
Defining the users, requirements, and methods is part of the _ _______ phase. *
1/1
a. analysis
b. design
c. implementation
d. testing
In the system development process, writing the program is part of the _____
phase. *
1/1
a. analysis
b. design
c. implementation
d. testing
In the system development process, structure charts are tools used in the __ ___
phase. *
1/1
a. analysis
b. design
c. implementation
lOMoAR cPSD| 23049225
d. testing
If A is the first data element input into a stack, followed by B, C, and D, then __ ___
is the first element to be removed. *
1/1
A
B
C
D
_ ______ is a measure of how tightly two modules are bound to each other. *
1/1
a. Modularity
b. Coupling
c. Interoperability
d. Cohesion
b. Cohesion
c. Neither coupling nor cohesion
d. Both coupling and cohesion
No correct answers
If A is the first data element input into a queue, followed by B, C, and D, then _____
is the first element to be removed. *
1/1
A
B
C
D
d. at least
b. second
c. last
d. after the right subtree
1/1
a. first
b. second
c. last
d. two times
c. Compressing
d. Authentication
In _ _ ___ cryptography, the same key is used by the sender and the receiver. *
1/1
a. symmetric-key
b. asymmetric-key
c. public-key
d. open-key
b. asymmetric-key
c. public-key
d. open-key
lOMoAR cPSD| 23049225
b. Asymmetric-key
c. Public-key
d. Open-key
c. Secret-key
d. Open-key
__ _ _____ means that the sender and the receiver expect confidentiality. *
1/1
a. Nonrepudiation
b. Integrity
c. Authentication
d. encryption and decryption
When a sequential file is updated, the _______ file gets the actual update. *
1/1
a. new master
b. old master
c. transaction
lOMoAR cPSD| 23049225
d. error report
When a sequential file is updated, the _______ file contains the changes to be ap-
plied. *
2/2
a. new master
b. old master
c. transaction
d. error report
If the transaction file key is 20 and the first master file key is 25, then we ___ _. *
1/1
If the transaction file key is 20 and the first master file key is 25, then we _______ _.
a. add the new record to the new master file
If the transaction file key is 20 with a delete code and the master file key is 20, then
we _ __ ...... *
1/1
a. add the transaction to the new master file
b. revise the contents of the old master file
c. delete the data
d. write the old master file record to the new master file
1/1
a. two
b. three
c. four
d. any number of
In the __ _ hashing method, selected digits are extracted from the key and used
as the address. *
1/1
a. direct
b. division remainder
c. modulo division
d. digit extraction
In the __ _ hashing method, the key is divided by the file size, and the address is
the remainder plus 1. *
1/1
a. direct
b. modulo division
c. division remainder
d. digit extraction
*
1/1
In the ________ hashing method, there are no synonyms or collisions.
a. direct
b. modulo division
c. division remainder
d. digit extraction
_ ______ are keys that hash to the same location in the data file. *
1/1
a. Collisions
b. Buckets
c. Synonyms
lOMoAR cPSD| 23049225
d. Linked lists
When a hashing algorithm produces an address for an insertion key and that ad-dress
is already occupied, it is called a ______ _. *
1/1
a. collision
b. probe
c. synonym
d. linked list
The _ ______ area is the file area that contains all the home addresses. *
1/1
a. probe
b. linked
c. hash
d. prime
In the ____ collision resolution method, we try to put data that cannot be placed in
location 123 into location 124. *
1/1
a. open addressing
b. linked list
c. bucket hashing
d. random hashing
lOMoAR cPSD| 23049225
In a three-level DBMS architecture, the layer that interacts directly with the hardware
is the _ ______ level. *
1/1
a. external
b. conceptual
c. internal
d. physical
d. physical
The _ ______ level of a three-level DBMS architecture defines the logical view of the
data. *
1/1
a. external
b. conceptual
c. internal
d. physical
The data model and the schema of a DBMS are often defined at the _____ lev-el. *
1/1
a. external
b. conceptual
c. internal
d. physical
In a three-level DBMS architecture, the _ _______ level interacts directly with the
users. *
1/1
lOMoAR cPSD| 23049225
a. external
b. conceptual
c. internal
d. physical
Of the various database models, the ________ model is the most prevalent today. *
1/1
a. hierarchical
b. network
c. relational
d. linked list
b. a tuple
c. a union
Tùy chọn 4
c. a union
d. an attitude
c. two, one
d. two, two
lOMoAR cPSD| 23049225
d. two, two
The unary _____ operation always results in a relation that has exactly one more
row than the original relation. *
1/1
a. insert
b. delete
c. update
d. select
If you want to change the value of an attribute of a tuple, you use the _ ______ op-
eration. *
1/1
a. project
b. join
c. update
d. select
If you need to delete an attribute in a relation, you can use the _ ____ operation. *
1/1
a. join
b. project
c. union
d. intersection
You want to create a relation called New that contains tuples that belong to both
relation A and relation B. For this, you can use the _____ operation. *
1/1
lOMoAR cPSD| 23049225
a. select
b. union
c. project
d. intersection
c. LES
d. PBJ
1/1
a. Masquerading
b. Traffic Analysis
c. Denial of service
d. Encoding
b. Modification
c. Denial of service
d. Decoding
b. Cryptography
c. Compressing
d. Authentication
__ _ ______ means that the data must arrive at the receiver exactly as they were
sent. *
0/1
a. Nonrepudiation
b. Message integrity
c. Authentication
d. Secrecy
c. Compression
lOMoAR cPSD| 23049225
d. Key-exchange
In _ _ ____ , the identity of a party is verified once for the entire duration of
system access. *
0/1
a. entity authentication
b. message integrity
c. message authentication
d. message encryption
c. secret-key
d. private-key
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known? *
1/1
a. encryption key only
b. decryption key only
b. symmetric-key
c. substitution
d. transposition
1/1
a. user A
b. user B
c. the network
d. a third party.