Tong Hop - Share Final
Tong Hop - Share Final
4. Personnel who design, program, operate and maintain computer equipment refers to
A. Console-operator
B. Programmer
C. Peopleware
D. System Analyst
E. None of the above
6. The operation that takes two relations and combines them based on common
attributes is the operation
A. join
B. project
C. union
D. intersection
10.To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then___ the
bit pattern and the mask.
A. AND
B. OR
C. XOR
D. NOT
11. A generalised software package produced to meet the bugs of a variety of data
processing users is known as
A. Utility programs
B. System software
C. Operating system
D. Application package
E.None of the above
13. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilitarianism
C. social contract
D. none of the above
15. Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B Microcomputers
C Mainframe computers
D. Supercomputers
E. None of the above
21. When a sequential file is updated, the ___ file contains a list of all errors occurring
during the update process
A. new master
B. old master
C. transaction
D. error report
24. If the transaction file key is 20 with a delete code and the master file key is 20, then
we___
A. add the transaction to the new master file
B. revise the contents of the old master file
C. delete the data
D. write the old master file record to the new master life
28 After a sequential file is updated, the___ file contains the most current data
A new master
B old master
C transaction
D error report
30. ___ means that the sender and the receiver expect confidentiality
A Non Repudiation
B integrity
C Authentication
D encryption and decryption
31. A hybrid computer used a ___ to convert digital signals from a computer into analog
signals
A. Modulator
B Demodulator
C Modem
D Decoder
E None of the above
32. In___ , the program can be divided into differently sized sections
A. partitioning
B paging
C demand paging
D demand segmentation
a. An array
b. A record
c. A linked list
d. A file
37. When a sequential file is updated, the ________ file gets the actual update.
a. New master
b. Old master
c. the transaction
d. the error report
39. The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.
a. Unsigned
b. Sign-and-magnitude
c. two’s complement
d. one’s complement
42. In the system development process, writing the program is part of the _______ phase.
a. Analysis
b. Implementation
c. design
d. testing
44. A data item which is not broken into smaller units is _____
a. Data element
b. Elementary data item
c. Data entry
d. Database management
e. None of above
46. A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).
a. one, one
b. one, two
c. two, one
d. two, two
47. The ________ construct uses a set of actions one after another.
a. Sequence
b. Decision
c. repetition
d. flow
48. In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU
b. input/output
c. memory
d. control unit
49. If A is the first data element input into a stack, followed by B, C, and D, then ________ is the
first element to be removed.
a. A
b. B
c. C
d. D
51. a _____ controller is a high-speed serial interface that transfers data in packets.
a. SCSI
b. USB
c. FireWire
d. USB and FireWire
52. a type of channel used to connect a central processor and peripherals which uses
multiplying is known as
a. Modern
b. Network
c. Multiplexer
d. All of the above
54. The most common binary code in use today is the 8 bit ASCII code. What do the letters
ASCII stand for?
a. American Standard Code for International Interchange
b. American Standard Code for Information Interchange
c. American Standard Code for Intelligence Interchange
d. American Scientific Code for Information Interchange
e. None of the above
a. only an array
b. only a record
c. only a linked list
d. an array, a record, or a linked list
58. In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures
a. bitmap
b. vector
c. quantized
d. Binary
59. Of the various database models, the ______ model is the most prevalent today.
a. hierarchical
b. network
c. relational
d. linked list
a. Magnetic card
b. Magnetic tape
c. Punched card
61. In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.
a. selection
b. bubble
c. insertion
a. Accumulator
b. Control unit
c. Register unit
d. Memory
a. 2
b. 8
c. 10
d. 16
a. (110)2
b. (141)8
c. (EF)16
d. 22A
65. Information about a product is that is kept secret by the owner is referred to as a ______
a. trade mark
b. trade secret
c. patent
d. Copyright
66. _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system
b. An algorithm
c. A data processor
d. A program
a. memory
b. process
c. device
d. File
a. 2
b. 8
c. 10
d. 16
69. An instruction that transfers program control to one or more possible paths is known as
a. Utility program
b. System software
c. Broadband channel
d. Application program
a. only data
b. only instructions
32. An index register that is automatically incremented or decremented with each use is?
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others
33. The_______contruct uses a set of actions one after another.
A. Sequence
B. Decision
C. Repetition
D. Flow
34. The base of the binary system is_____?
A. 2
B. 8
C. 10
D. 16
35. The most important advantage of a video disk is______
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
36. ______ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
37. In the_______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary
38. Main memory is the second major subsystem in a computer. It consists of a collection of
storage locations, each with a unique identifier, called an_____?
A. Values
B. Address
C. Bit
D. Words
39. A process in the ready state goals to the running state when_____.
A. It enters memory
B. It request I/O
C. It get access to the CPU
D. It finishes running
40._______ is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
41. In ______ paradigm, the service provider is an application program, it runs continuously,
waiting for another application program, then to make a connection through the Internet and ask
for service.
A. P2P
B. Traditional
C. Client-server
D. Model
42. In a stream cipher encryption and decryption are done one symbol. We have a plaintext
stream a ciphertext stream and a______
A. Key block
B. Single Key
C. Key stream
D. Auto key
43. In monoprogramming, most of the memory capacity is dedicated to a__if we consider the
data to be processed by a program as part of the program.
A. Single program
B. Multi program
C. Address location
D. Set of instruction
44. How can we set name of nodes in a linked list?
A. Depend on the user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
45. There are serval methods for handling address collisions and each of them ___of the
hashing algorithm.
A. Independent
B. Dependent
C. Base on
D. Related
46. Defining the users, requirements, and methods is part of the ____ phase
A. Analysis
B. Design
C. Implementation
D. Testing
47. The_____in the TCP/IP protocol suite is responsible for the host-to-host delivery of the
messages.
A. Physical
B. Data-link
C. Network
D. Transport
48. If personal information about each employee in a company is stored in a file we can
use____ access to retrieve each record at the end of the month to print the paychecks. A.
Hashed file
B. Sequential file
C. EOF
D. Index file
49. The attack that reduces the capabilit of a computer is called a______ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
50. A company’s product or service is identified as a_______
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
51. The operation that takes two relations and combines the based on common attributes is
the ______ operation.
A. Join
B. Project
C. Union
D. Intersection
52. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the others
53. An_____ of a binary search tree (BST) creates a list that is sorted min ascending order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
54. An indexed file consists of______.
A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55. Each node in a graph can have ______parents
A. Only one
B. No node
C. One or more
D. At most two node
56. The enqueue operation___ an item at the _____ of the queue
A. Delete front
B. Delete end
C. Inserts front
D. Insert rear
57. A mechanism for arranging controlled access to a shared resource is
A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others
58. The octal equivant of 1100101.001010 is
Grouping in groups of three
A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the others
59. RISC (reduced instruction set computer). The strategy behind RISC architecture is to
have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
60. A data structure can be_____
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
1.Before a disk drive can access any sector record ,a computer program has to provide the
record’s address .What information does this address specify?
A.Track number
B.Sector number
C.Surface number
D.All of above
E.None of the above
2.The unit of a computer that executes program,communicates with and often controls the o
other subsystems of the computer is known as
A.CPU
B.Control unit
C.I/O unit
D.Peripheral unit
E.None of above.
3.A hybrid computer uses a ____ to convert digital signals from a computer into analog
signals.
4.____ is a measure of how tightly two modules are bound to each other.
A.Modularity
B.Coupling
C.Interoperability
D.Cohesion.
5.Registers which are partially visible to user and used to hold conditional codes (bits set by
the CPU as the result of operations), are known as
A.PC
B.Memory Address Registers
C.General purpose registers
D.Flags
E.None of above
7. A type of channel used to connect a central processor and peripherals which uses
multiplying is known as
A.Modern
B.Network
C.Multiplexer
D.All of the above
E.None of above
A.Insertion
B.Searching
C. Recursion
D.Iteration
11.The difference between memory and storages is that memory is__ and storage is ___
A.Temporary, permanent
B.Permanent, temporary
C.Slow, fast
D.All of above
E.None of the above
12.In a three - level DBMS architecture, the ___ level interacts directly with the users
A. external
B. conceptual
C. interal
D. Physical
13.____ is a declarative language used on relational databases
A.PDQ
B.SQL
C.LES
D.PBJ
14. In postorder traversal of a perfect binary tree, the left subtree is processed____
A.first
B.second
C.last
D.after the right subtree
38. The attack that reduces the capacity of a computer is called a______ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
39. In the third generation of computers:
A. distributed data processing first became popular
B. an operating system was first developed
C. high-level procedural languages were first used
D. on-line, real time systems first became popular
E. All of the above
40. I a linked list, each element contains_____
A. only data
B. only a link
C. neither data nor a link
D. data and a link
41. The combination of sign and mantissa of a real number in IEEE standard floating point
format is integer in the______ representation.
A. unsigned
B. sign-and-magnitude
C. two’s complement
D. one’s complement
42. Any device that performs signal conversion is
A. Moduator
B. Modem
C. Keyboard
D. Plotter
E. None of the above
43. For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement for
A. 8
B. 127
C. 128
D. 256
44. A device that prints one character at a time is know as
A. Laser printer
B. line printer
C. Character printer
D. Dot-Matrix printer
E. None of the above
45. A right to a monopoly to use a pice of intellectual property is referred to as_____
A. trade mark
B. trade secret
C. patent
D. copyright
46. The operation that takes two relations and combines them based on common attributes is
the_____ operation
A. join
B. project
C. union
D. intersection
47. If A is the first data element input into a queue, followed by B,C, and D, then_____ is the
first remove
A. A
B. B
C. C
D. D
48. A computer language that is written in binary codes only is_____
A. machine language
B. C
C. C#
D. pascal
E. None of the above
49. In________ traversal of a perfect binary tree, the left subtree is processed second
A. preorder
B. inorder
C. postorder
D. out of order
50. The layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame
two adjacent nodes
A. transport
B. network
C. date-link
D. session
51. The organization and interconnection of the various components of a computer system is
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the above
52. How many symbols can be represented by a bit pattern with ten bits?
A. 128
B. 256
C. 512
D. 1024
53. The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the above
54. ______ Is a stand-alone storage location that holds data temporarily
A. An ALU
B. A register
C. A control unit
D. A tape drive
55. _______ operator (s) takes two inputs to produce one output
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
56. A data item which is not broken down into smaller units is______
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. None of the above
57 :______ protocol(s) is one of the protocols in the transport layer
A : Only TCP
B : Only UDP
C : Only SCTP
D : TCP , UDP and SCTP
58 : The base of the octal number system is
A: 2
B: 8
C: 10
D:16
59: ____ is an arithmetic operation
A : The exclusive OR
B : The unary NOT
C : Subtraction
D: The binary AND
60 : When a sequential file is updated , the __ file contains the changes to be applied
A : New master
B : Old master
C : Transaction
D : Error Report
61 : Each element in a record is called ___
A: a variable
B an index
C:a field
D:a node
62 : The RSA algorithm for confidentially uses ____ cryptography
A: asymmetric-key
B:symmetric -key
C:substitution
D: transposition
63 : _____ means that the data must arrive at the receiver exactly as they were sent
A: Nonrepudiation
B: Message integrity
C: Authentication
D : Secrecy
64 :The process of entering data into a storage location
A: adds to the contents of the location
B :cause variation in its address number
C :is known as a readout operation
D: is destructive of previous contents
E : None of the above
65: To prevent ____ , an operating system can put resource restrictions on processes
A : starvation
B : Synchronization
C : Paging
D : Deadlock
66 : The third generation of computers covers the period
A : 1971 - 1982
B:1982 -1994
C : 1959-1964
D: 1965-1971
E : 1995 - Now
67: if you want to change the value of an attribute of a tuple , you use the ___ operation A
. project
B. join
C: Update
D: Select
68 : A program that converts computer data into some code system other than the normal
one is known
A : Encoder
B : Simulation
C : Emulator
D : Coding
E : None of the above
69 : Tape is an example of storage device that can be accessed ______
A : sequentially
B : Randomly
C : Hash
D : No
70 : ______ is a protocol for file transfer
A : FTP
B :SMTP
C: TELNET
D: HTTP
1/ The _____ layer of the TCP/IP protocol suite transmits a bit steam over a physical
medium
A. Physical
B. Datalink
C. Transport
D. Network
2/ JPEG encoding involve ____, a process that reveals the redundancies in a block
A. Vectorization
B. Blocking
C. Quantization
D. The discrete cosine transform
3/ ______ can occur if a process has to many resource restriction
A. Deadlock
B. Synchronization
C. Paging
D. Starvation
4/ ______ cryptography is often for short messages.
A. Asymmetric-key
B. Secret-key
C. Symmetric-key
D. Open-key
5/ In_______, the identity of a party is verified once for the entire duration of system access.
A. Message authentication
B. Entity authentication
C. Message encryption
D. Message integrity
6/ In a computer, the ________ subsystem stores date and program.
A. Control unit
B. ALU
C. Input/output
D. Memory
7/ in the_______ graphic method of representing an image in a computer, re-scalling of the
image creates a ragged or grainy image.
A. Quantized
B. Vector
C. Bitmap
D. Binary
8/ To find the orientation of an object, we use:
A. Stereo vision
B. Segmentation
C. Texture
D. Motion
9/ The _______ construct tests a condition
A. Flow
B. Sequence
C. Decision
D. Repetition
10/ When a hashing algorithm produces an address for an insertion key and that ad-dress is
already occupied, it is called a___.
A. Linked list
B. Collision
C. Synonym
D. Probe
11/ Which number representation method is often used to store the exponential value of a
fractional part?
A. Ten’s complement
B. Excess
C. Unsigned integers
D. Two’s complement
12/ The_____ is a computer subsystem that performs operation on data.
A. Memory
B. Bus system
C. I/O hardward
D. CPU
13/ What is the domain name in the email address [email protected]?
A. Fpt.edu.vn
B. Edu
C. Longnq9
D. [email protected]
14/ When we want to store music in a computer, the audio signal must be___.
A. Smpled only
B. Coded only
C. Quantized only
D. Sampled, quantized, and coded
15/ IP addresses are currently_____ bits in length.
A. 4
B. 40
C. 32
D. 8
16/ Each column in a relation is called____.
A. An attribute
B. A union
C. A tuple
D. An attitude
17/ A binary operation os applied to ______ relations (s) and creates an output of ____
relation(s)
A. One, two
B. Two, two
C. Two, one
D. One, one
18/ The three steps in the running of a program on a computer are performed in the specific
order____.
A. Fetch, decode, and execute
B. Fetch, execute, and decode
C. Decode, fetch, and execute
D. Decode, execute, and fetch
19/ The push operation_____ of the stack.
A. Deletes an item from the bottom
B. Inserts an item at the bottom
C. Deletes an item from the top
D. inserts an item at the top
20/ The____ scheduler moves a process form one process state to another.
A. Vietual
B. Process
C. Queue
D. Job
21/ _____ is a protocol for email services.
A. SMTP
B. TELNET
C. FTP
D. HTTP
22/ The____ level of a three-level DBMS architecture defines the logical view of the data.
A. Internal
B. External
C. Conceptual
D. Physical
23/ When a sequential file is updated, the_____ file gets the actual update.
A. Transaction
B. Error report
C. Old master
D. New master
24/ To un-set (force to 0) all the bits of a bit pattern, make of all 0s and then____ the bit
pattern and the mask.
A. NOT
B. AND
C. XOR
D. OR
25/ Main memory in a computer usually consists of large amounts of____speed memory.
A. High
B. Low
C. Very high speed
D. Medium
26/ in JPEG encoding, the___ process breaks the original picture into smaller blocks and
assigns a value to each pixel in a block.
A. The discrete cosine transform (DCT)
B. Blocking
C. Vectorization
D. Quantization
27/ The____ layer of the TCP/IP protocol suite is responsible for source-to-destinnation
delivery of the entire message.
A. Datalink
B. Transport
C. Session
D. Network
28/ In the_____ hashing method, the key is divided by the file size, and the address is the
remainder plus 1.
A. Modulo division
B. Direct
C. Digit extraction
D. Division remainder
29/ When converting a decimal fraction to base b, we repeatedly___b.
A. Subtract form
B. Divide by
C. Add to
D. Multiply by
30/ Which of the following is considered an intellectual property?
A. a patent
B. A strade secret
C. A strademark
D. All of the above
42. In postorder traversal of a binary tree, the left subtree is processed _____
A. second
B last
C. first
D after the right subtree
43. In ____ cryptography, the same key is used by the sender and the receiver. A.
symmetric-key
B. public-key
C. asymmetric-key
D. open-key
44. A control unit with five wires can define up to ____ operations.
A. 5
B. 25
C. 10
D. 32
45. If you need to delete an attribute in a relation, you can use the ___ operation.
A. join
B. intersection
C. project
D. union
46. ____ data compression method, the received data need not be an exact copy of the
original message.
A. Only in JPEG
B. Only in JPEG
C. Only in MP3
D. In MP3. JPEG, or MPEG
47. If the memory has 2^32 words, the address bus needs to have ____ wires.
A. 32
B. 16
C. 64
D. 8
48. The ____ is a pointer that identifies the next element in the linked list.
A. link
B array
C. data
D node
49. ______ is multi-programming without swapping.
A. Virtual memory
B Demand paging
C. Partitioning
D Queuing
50. ________ is an English-language-like representation of code.
A. An algorithm
B An UML diagram
C. A program
D Pseudocode
51. If A is the first data element input into a stack, followed by B, C, and D, then ____ is the
first element to be removed.
A. C
B. A
C. D
D. B
52. We use a _____ search for an ordered list.
A. sequential
B. binary
C. bubble
D. insertion
53. If we are adding two numbers, one of which has an exponent value of 7 and the other an
exponent value of 9, we need to shift the decimal point of the smaller number
A. two places to the left
B. one place to the right
C. two places to the right
D. one place to the left
54. ____ is a process in which an algorithm call itself
A. Iteration
B. Recursion
C. Searching
D. Insertion
55.______ operator (s) takes two inputs to produce one output.
A. Only OR
B. Only NOT
C. Only AND
D. AND, OR, or NOT
56. In the system development process, writing the program is part of the _____ phase
A. implementation
B design
C. analysis
D testing
57. In ____ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.
A. selection
B every
C. bubble
D insertion
58. ____ between modules in a software system must be maximized.
A. Both coupling and cohesion
B Cohesion
C. Coupling
D. Neither coupling nor cohesion
59. A company’s product or service is identified as a______
A. a trademark
B. a patent
C. a trade secret
D. copyright
60. ____ is a unit that can add two inputs.
A. A register
B An ALU
C. A control unit
D. A tape drive
61. In a computer, the _____ subsystem performs calculations and logical opera-tions.
A. control unit
B ALU
C. memory
D input/output
62. In ______ cryptography, everyone has access to everyone's public key.
A. private-key
B symmetric-key
C. asymmetric-key
D secret-key
63. The ____ is the theoretical counterpart of the CPU.
A. disk
B tape
C. read/write head
D controller
64. We use ____ to denote a program's complexity.
A. the Simple Language
B factorials
C. big-0 notation
D the Turing number
65. In language understanding, parsing a sentence is part of:
A. semantic analysis
B syntactic analysis
C. pragmatic analysis
D speech recognition
66. In ____ encoding, the more frequently occurring characters have shorter codes than the
less frequently occurring characters.
A. JPEG
B . LZ
C. Huffman
D Run-length
4. When a sequential file is updated, the___ file contains the changes to be applied. A.
new master
B. old master
C. transaction
D. error report
9. A program that converts computer data into some code system other than the normal
one is known as.
A. Encoder
B. Simulation
C. Emulator
D. Coding
E. None of the above
15. An array that consists of just rows and columns is a ___ array.
A. one-dimensional
B. two-dimensional
C. three-dimensional
D. multidimensional
16. The TCP/IP model has___ layers.
A. five
B. SiX
C. seven
D. eight
17. The precision of the fractional part of a number stored in a computer is defined by
the____
A. sign
B. exponent
C. mantissa
D. last digit
18. The ethical principle that dictates that a decision should be made according to the
universally accepted principles of morality is referred to as ____
A. moral rules
B. utilization
C. social contract
D. none of the above
20. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilization
C. social contract
D. none of the above
22. In___________ traversal of a perfect binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postorder
D. any order
23. Which of the following can store information in the form of microscopic pits on metal
disks.
A. Laser disks
B. Tape cassettes
C. RAM cartridge
D. Punched cards
E. None of the above
25. Information about a product is that is kept secret by the owner is referred to as a__
A. trade mark
B. trade secret
C. patent
D. copyright
A. symmetric-key
B. asymmetric key
C. secret-key
D. privale-key
27. The________ construct tests a condition.
A. sequence
B. decision
C. repetition
D. flow construct tests a condition.
28. In_______ traversal of a perfect binary tree, the left subtree is processed
second.
A. preorder
B. inorder
C. postorder
D. out of order traversal of a perfect binary tree, the left subtree is processed second.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
33. Who is considered the 'father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kennoth H. Olsen
C. Seymour Cray
D. Basic Pascal E.
None of the above
34. A_________ controller is a high-speed serial interface that transfers data in packets.
A. SCSI
B. USB
C. FireWire
D. USB and FireWire controller is a high-speed serial interface that transfers data in
packets.
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key
38. In______sort, the item that goes into the sorted list is always the first item in the
unsorted list.
A.Selection
B. bubble
C. insertion
D. every
A. machine
B. symbolic
C. high-level
D. natural
41. ________is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
1.The_____deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
2.The format of an IPv4 address is referred to as______
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation
B. 11001111
C. 11001001
D. 11100110
A
14.____uses the principle of logical reasoning to answer queries. It is based on
formal logic defined by Greek mathematicians and later developed into firstorder
predicale calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
15.In the data link layer, a Bluetooth LAN is a (an)____network
A. Wired WANs
B. Ad hoc
C. Dial-up service
D. Extended Service Set
16._______is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
Obsolescence
D. Modularization
17.The ability of a computer system to remain operational despite various failures is
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
18.Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
19.Defining the users, requirements, and methods is part of the
A. Analysis
B. Design
C. Implementation
D. Testing
phase.
20.In a____the project team needs to choose a language or a set of languages from
among the procedural languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
21.____can be threatened by security attacks
A. Confidentiality, cryptography, nonrepudiation
B. Confidentiality, encryption, decryption
C. Confidentiality, integrity, availability
D. Confidentiality, denial of service, masquerading
22.______protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
23.Static RAM (SRAM) technology uses____The gates hold their state 0 or 1
A. Ultraviolet light
B. Electronic impulses
C.Capacitors
D.Flip-flop gates
24.To search for elements. we can use____on sorted arravs that can help to
decrease time complexity
A Sequential search
B. Insertion Sort
C. Selection sort
D. Binary search
25.C language is a(n)_____ language
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
26.______is a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D.A tape drive
27.The number of bits per sample is sometimes referred to as the_____
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28.The maximum value of an octal integer with K=2 digits is Nmax =____
A. 63
B. 64
C. 65
D. 66
E. None of the others
29.A company's product or service is identified as a
A Trade mark
B. Trade secret
C. Patent
D.Copyright
30.Which of the following representations is erroneous?
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
30.What is method in black-box testing which tests are designed to include
representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
31.______is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
32.A system program which helps the execution of user programs is known as
A. System software
B. Application program
C. Batch operating system
D. Utilities
E. None of the others
A. Graph
B. Tree
C. Array
D. Record
A. Accuracy
B. Security
C. Efficiency
D. Correctability
35.In _________ sort, the smallest item moves to the beginning of the unsorted list.
There is no one-to-one swapping.
A Selection
B. Bubble
C. Insertion
D. Every
36._____ is an attack that reduce the capability of a computer system to
function correctly or bring the system down together by exhausting its
resources
A. DoS
B. Trojan horses
C. Worms
D. Viruses
B. Because these devices are slower in speed compared with the CPU and
memory
C. It may use FIFO for one device
D. The manager also needs to know when a device has finished serving
one process
38. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
39. The operation that takes two relations and combines them based on common
attributes is the operation.
A Join
B. Project
C. Union
D. Intersection
40. In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4
45. If the ASCII code for E is 1000101, then the ASCII code for e is consulting the
ASCII table.
A 1000110
B. 1000111
C. 0000110
D. 1100101
A Sequential
B. Binary
C. Bubble
D. Insertion
48. An_____ is a sequence of operands and operators that reduces to a single value
A. Expression
B. Operator
C. Variables
D. Input/output
49. _____is a series of randomized letters and numbers which humans cannot make
any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
50. A____is a collection of related elements possibly of different types having a single
name
A. Array
B. Record
C. Linked list
D. Tree
51. In______cryptography, everyone has access to everyone's public key
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52. In____,the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
54. Use a circular right shift operation on the bit pattern 1001 1000?
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000
55. Which type of computers use the 3 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others
57. Who is considered the father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others
58. In____, ledges are ordered pairs of vertices. If x and y are two vertices and an edge
e = (x, y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
59. The attack that reduces the capability of a computer is called a ____attack
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
38.
41. The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Running
C. Functioning properly
D. Finished
42. The ______manager is responsible for archiving and backup.
A. Memory
B. File
C. Process
D. Device
43. _____is a step-by-step method for solving a problem or doing a task.
A. A construct
B. An algorithm
C. A recursion
D. An iteration
44. After a sequential file is updated, the ______file contains the most current data.
A. Transaction
B. Old master
C. New master
D. Error report
45. In the relational database model data is organized in________called relations.
A. None of others
B. Two-dimensional array
C. Two-dimensional tables
D. Two-dimensional record
46.
47. What is the name given to the molecular-scale computer?
A. None of the others
B. Femtocomputer
C. Nanocomputer
D. Microcomputer
E. Supercomputer
48.
49. An instruction that transfers program control to one or more possible paths is known as
A. Broadband channel
B. None of the others
C. Utility program
D. System software
E. Application program
50. _______is an English-language-like representation of code.
A. A program
B. Pseudocode
C. A UML diagram
D. An algorithm
51. The first electronic special-purpose computer was called_______.
A. ENIAC
B. Pascaline
C. ABC
D. Pascal
52. A transport-layer payload may be_____in several network-layer packets.
A. Encrypted
B. Decapsulated
C. Decrypted
D. Encapsulated
33.
A/an _______ is a program in a procedural language that is a set of statements. The
statements are normally executed one after another. However, sometimes it’s necessary to
change this sequential order. This figure illustrates for this statement.
A. Assignment statement
B. compound statement
C. None of others
D. Control statement
34. In______, the program can be divided into differently sized section
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
35. What is quality referring to the ability to move software from one hardware platform to
another
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
36. C, C++, and Java can be classified as ______ languages.
A. Machine
B. Symbolic
C. High-level
D. Natural
37. In a block cipher a _____ is used to encrypt the whole even if the key is made of multiple
values
A. Key block
B. Single key
C. Key stream
D. Auto key
38. In _______ traversal of a binary tree, the right subtree is processed last.
A. Preorder
B. Inorder
C. Postorder
D. Any order
39. In _______cryptography, the same key is used by the sender and the receiver.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Open-key
40. Which of following that describe to the secure, information needs to be hidden from
unauthorized access ?
A. Confidentiality
B. integrity
C. Availability
D. Masquerading
41. The operation that takes two relations and combines them based on common attributes is
the _____ operation.
A. Join
B. Project
C. Union
D. Intersection
43.____ can be programmed by the user. but can also be erased with a special device that
applies ultraviolet light.
A. ROM
B. EEPROM
C. PROM
D. EPROM
44.____these are the "bad guys". They are the types of hackers who break into computer
networks with purely negative motives such as monetary gain or reputation
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
45.Which access method is used for obtaining a record from a cassette tape
A. Direct
B. Sequential
C. Random
D. All of the others
E None of the others
46.We can convert a number in any system to decimal. We multiply each digit with its____ in
the source and add the result to get the number in the decimal system. A. Numbers
B. Values
C. Place value
D. None of others
47.In____ cryptography, everyone has access to everyone's public key.
A Symmetric-key
B. Asymmetric-key
C Secret-key
D. Private-key
48.____file can be accessed sequentially.
A A sequential
B. An indexed
C. A hashed
D. No
49.The____manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
50.Use a simple right shift operation on the bit pattern 1001 1000.
A 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
51.Adding numbers in two's complement is____
A. Like adding the numbers in decimal
B. Logic operations
C. Shift operations
D. Arithmetic shift operations
52.What happens if the size of memory is less than the size of the program in a
monoprogramming OS?
A Need to use virtual memory
B. No overflow
C. Overflow
D. The program cannot be run
53.____refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17.2, it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
54.IfA is the first data element input into a stack, followed by B, C, and D, then____is the first
element to be removed
A. A
B. B
C. C
D. D
55.Which of the following is the user programmed semiconductor memory?
A SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
56.In____ sort, the item that goes into the sorted list is always the first item in the unsorted
list.
A Selection
B. Bubble
C. Insertion
D. Every
57.The devices in Bluetooth LAN, SOmetimes called gadgets, find each other and make a
network called____
A. ESS
B. Ad hoc
C. BSS
D. A piconet
58.The ethical principle that dictates that an act is ethical when a majority of people in
society agrees with it is referred to as____
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
59.The ____ is a protocol that is used to define how the client-server programs can be
written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
60.There are____ basic constructs in computer -science.
A One
B. Two
C. Three
D. Four
61.A database management system (DBMS) is a combination of components
A. 2
B. 3
C. 4
D. 5
62.The____is a computer subsystem that performs operations on data.
A. CPU
B. Memory
C. I/O hardware
D. Bus subsystem
63.When a sequential file is updated, the _____file gets the actual update.
A. New master
B. Old master
C. Transaction
D. Error report
64.Java is a(n)______language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
65.The base of the decimal number system is_____
A. 2
B. 8
C. 10
D. 16
66.____is an English-language-like representation of code
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
67.In physical layer, a____, can have only a limited number of defined values.Although each
number, it is often as simple as 1 and 0.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
68.The binary equivalent of the Octal number 13.54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
69.We use a______search for an unordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
70.In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 20 in hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
71.How many bits that we can find in the decimal number 20 in binary system?
A. 4
B. 5
C. 6
D. 7
72.A___is a nonactive set of instructions stored on disk (or tape).It may or may not become a
job
A. Program
B. Job
C. Process
D. Task
73.Given a linked list called children, the pointer variable children identifies____element of
the linked list
A. The first
B. The second
C. The last
D. Any
74.Each row in a relation is called_____
A. An attribute
B. A tuple
C. A union
D. An attitude
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the others
76.The queue operation:”queue (queueName)” is used to____
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
77.The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Finished
C. Functioning properly
D. Running
To search for elements, we can use____on sorted arrays that can help to decrease time
co…..
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
A. 4
B. 8
C. 16
D. 32
The____is a pointer that identifies the next element in the linked list.
A. Link
B. Node
C. Array
D. Data
16. What is a program of UNIX that accepts requests from users (processes) and interprets
them the operating system?
A Software
B. Function
C. SHELL
D. Feature
19.In. ......... a the project team needs to choose a language or a set of languages from
among the languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
22. The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALU
C. Control unit
D. Store location
E. None of the others
23. A process in the ...........state can go to either the ready, terminated, or waiting states.
A. Hold
B. Virtual
C. Running
D. Hold or running
25. We can convert a number in any system to decimal. We multiply each digit with its. ..... in
the and add the result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others
26. In the storing audio, if the signal is changing rapidly, we need more samples. It has been
sho ......... 40000 samples per second is good enough to reproduce an audio signal.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
27. The ....... deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
31. In the asymmetric-key method used for confidentiality, which key(s) is ( are ) publicly
known ?
A. Encryption Key only
B. Decryption Key only
C. Both Encryption and Decryption keys
D. Neither encryption key nor decryption key
E.
35. What is a program of UNIX that accepts requests from users (processes) and interprets
the operating system?
A. Software
B. Function
C. SHELL
D. Feature
36. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link.
B. Transport
C. Application
D. Physical
37. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known?
A. Encryption key only
B. Decryption key only
C. Both encryption and decryption keys
D. Neither encryption key nor decryption key
38. The term users in a DBMS has a broad meaning. We can divide users
into:A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrator
43. The unary operation always results in a relation that has exactly one more
rowthan relation
A. Insert
B. Delete
C. Update
D. Select
No. CHAPTER 1-20
1 The _______ model is the basis for today's computers.
a. Leibnitz b. von Neumann c. Pascal d. Charles Babbage
2 In a computer, the _______ subsystem stores data and programs.
a. ALU b. input/output c. memory d. control unit
3 In a computer, the _______ subsystem performs calculations and logical operations.
a. ALU b. input/output c. memory d. control unit
4 In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU b. input/output c. memory d. control unit
5 In a computer, the _______ subsystem serves as a manager of the other subsystems.
a. ALU b. input/output c. memory d. control unit
6 According to the von Neumann model, _______ are stored in memory.
a. only data b. only programs c. data and programs d. neither data nor
programs
7 A step-by-step solution to a problem is called _______.
a. hardware b. an operating system c. a computer language d. an
algorithm
8 FORTRAN and COBOL are examples of _______.
a. hardware b. operating systems c. computer languages d. algorithms
9 A 17th-century computing machine that could perform addition and subtraction was the
_______.
a. Pascaline b. Jacquard loom c. Analytical Engine d. Babbage
machine
10 _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system b. An algorithm c. A data processor d. A
program
11 _______ is the design and writing of a program in structured form.
a. Software engineering b. Hardware engineering
c. Algorithm development d. Instructional architecture
12 The first electronic special-purpose computer was called _______.
a. Pascal b. Pascaline c. ABC d. ENIAC
13 One of the first computers based on the von Neumann model was called _______.
a. Pascal b. Pascaline c. ABC d. EDVAC
14 The first computing machine to use the idea of storage and programming was called
_______.
a. the Madeline b. EDVAC c. the Babbage machine d. the Jacquard
loom
15 _______ separated the programming task from computer operation tasks.
a. Algorithms b. Data processors
c. High-level programming languages d. Operating systems
16 The base of the decimal number system is ____.
a. 2 b. 8 c. 10 d. 16
17 The base of the binary number system is ____.
a. 2 b. 8 c. 10 d. 16
18 The base of the octal number system is ____.
a. 2 b. 8 c. 10 d. 16
19 The base of the hexadecimal number system is ____.
a. 2 b. 8 c. 10 d. 16
20 When converting a decimal integer to base b, we repeatedly _____ b.
a. divide by b. multiply by c. add to d. subtract from
21 When converting a decimal fraction to base b, we repeatedly ____b.
a. divide by b. multiply by c. add to d. subtract from
22 Which of the following representations is erroneous?
a. (10111)2 b. (349)8 c. (3AB)16 d. 256
23 Which of the following representations is erroneous?
a. (10211)2 b. (342)8 c. (EEE)16 d. 145
24 Which of the following representations is erroneous?
a. (111)2 b. (346)8 c. (EEG)16 d. 221
25 Which of the following representations is erroneous?
a. (110)2 b. (141)8 c. (EF)16 d. 22A
26 Which of the following is equivalent to 12 in decimal?
a. (1110)2 b. (C)16 c. (15)8 d. None of the above
27 Which of the following is equivalent to 24 in decimal?
a. (11000)2 b. (1A)16 c. (31)8 d. None of the above
28 A data structure can be _______.
a. only an array b. only a record
c. only a linked list d. an array, a record, or a linked list
29 An array that consists of just rows and columns is a _______ array.
a. one-dimensional b. two-dimensional
c. three-dimensional d. multidimensional
30 Each element in a record is called _______.
a. a variable b. an index c. a field d. a node
31 All the members of a record must be ______.
a. the same type b. related types c. integer type d. character type
32 _____ is an ordered collection of data in which each element contains the location of the
next element.
a. An array b. A record c. A linked list d. A file
33 In a linked list, each element contains _______.
a. only data b. only a link c. neither data nor a link d. data and a link
34 The _______ is a pointer that identifies the next element in the linked list.
a. link b. node c. array d. data
35 Given a linked list called children, the pointer variable children identifies ________ element
of the linked list.
a. the first b. the second c. the last d. any
36 An empty linked list consists of _______.
a. a node b. two nodes c. data and a link d. a null head pointer
37 To traverse a list, you need a _______ pointer.
a. null b. walking c. beginning d. insertion
38 _______ is a sequenced collection of elements, of the same data type. We can use indexes
to refer to the element of an array.
a. record b. an array c. linked list d. retrieval
39 _______ is a collection of related elements, possibly of different types, having a single-
name.
a. array b. linked list c. record d. field
40 ________ uses a collection of related variables that can be accessed individually or as a
whole and it represents a set of data items that share a specific relationship.
a. ADT b. Database c. SQL d. Data structure
41 How many are common operations there on array?
a. 3 b. 2 c. 5 d. 8
42 _______ defines a combination of elements, while ______ defines the identifiable parts of
an element.
a. An array/a record b. Record/ Linked list c. An array/Linked list d. List/
tuple
43 ________ is package that defines a new data type, defines operations on that data type,
and encapsulates the data and the operations.
a. ADT b. Database c. SQL d. Data structure
44 _______ is a restricted linear list in which all additions and deletions are made at one end,
called the top.
a. Queue b. Stack c. Binary tree d. ADT
45 A (n) ________ list is also known as a queue.
a. LIFO b. FIFO c. insert d. pop
46 If A is the first data element input into a stack, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
47 If A is the first data element input into a queue, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
48 We defined four basic operations on a queue
a. stack, push, pop, empty b. list, insert, delete, traverse, empty
c. queue, enqueue, dequeue, empty d. depth first, breadth first
49 The pop operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
50 The push operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
51 ______ is a tree in which no node can have more than two subtrees. In other words, a node
can have zero, one, or two subtrees.
a. Queue b. Stack c. Binary tree d. ADT
52 How many are most common operations defined for a binary tree?
a. 9 b. 7 c. 6 d. 5
53 In _______ the left subtree is processed first, then the root node and finally the right
subtree.
a. post-order traversal b. in-order traversal c. pre-order traversal d.
None of the above
54 In post-order traversal of a binary tree, the left subtree is processed________
a. First b. Second c. Third d. last
55 In preorder traversal of a binary tree, the ______is processed first, followed by the left
subtree
a. the right subtree b. root node c. Binary tree d. left subtree
56 _________ is a binary tree with one extra property: the key value of each node is greater
than the key values of nodes in each left subtree and smaller than the value of all nodes in
each right subtree
a. Queue b. Stack c. BST d. BTT
57 When a sequential file is updated, the ________ file gets the actual update.
a. New master b. Old master c. the transaction d. the error
report
58 When a sequential file is updated, the ________ file contains a list of all errors occurring
during the update process.
a. New master b. Old master c. the transaction d. the error
report
59 When a sequential file is updated, the ________ file contains the changes to be applied.
a. New master b. Old master c. the transaction d. the error
report
60 If the transaction file key is 20 and the first master file key is 25, then we ________ .
a. add the new record to the new master file b. delete the data
61 If the transaction file key is 20 with a delete code and the master file key is 20, then we
________ .
a. add the new record to the new master file b. delete the data
62 All the members of a record must be _______.
a. The same type b. The integer type c. the related types d. the
character type
63 The _______ level of a three-level DBMS architecture defines the logical view of the data
a. physical b. external c. internal d.
conceptual
64 In the system development process, structure charts are tools used in the _______ phase.
a. analysis b. implementation c. design d.
testing
65 In _______, the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
a. demand paging b. paging c. demand segmentation
d. partitioning
66 In a three-level DBMS architecture, the _______ level determines where data is actually
stored on the storage devices.
a. physical b. external c. internal d.
conceptual
67 In the system development process, writing the program is part of the _______ phase.
a. both black-box and glass box b. glass box c. black box d. neither black
box nor glass box
76 Defining the users, requirements, and methods is part of the _______ phase
a. 4 b. 8 c. 40 d. 32
81 The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.
a. 64 b. 256 c. 32 d. 8
107 If the memory address space is 16 MB and the word size is 8 bits, then________ bits are
needed to access each word
a. 24 b. 16 c. 8 d. 32
108 The data in ________ is erased if the computer is powered down.
a. 24 b. 23 c. 28 d. 216
112 ________ is a type of memory in which the user, not the manufacturer, stores programs
that cannot be overwritten.
a. PROM b. DRAM c. SRAM d.
EPROM
113 The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of
a frame between two adjacent nodes
a. data link b. network c. transport d.
physical
114 The ________ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message
a. fetch, decode, and execute b. data bus, address bus, control bus
c. SCSI, Fire wire, USB d. None of the above
118 A control bus with eight wires can define ________ operations.
a. 64 b. 512 c. 256 d. 32
120 A ________ is a storage device to which the user can write information only once.
a. They were more expensive than tubes but lasted longer and were cooler in temperature.
b. They didn't last as long as tubes but were less expensive.
c. They were cheaper and smaller than tubes.
d. They were cheaper, smaller, and cooler than tubes and lasted longer.
126 DSL speeds range from:
a. 16 b. 32 c. 64 d. 80
132 A ____________ is used as a visual model for describing a program's logical steps
a. 5 b. 4 c. 6 d. 3
147 The ________ construct uses a set of actions one after another.
160 What is the positional value of the 7 in the base 8 number 2715?
a. 16 b.8 c. 64 d.100
161 Which of the following is not one of the basic Boolean operators?
Trang 13
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs)
focuses on “File Management Systems”.
1. If h is any hashing function and is used to hash n keys in to a table of size m, where
n<=m, the expected number of collisions involving a particular key x is :
a) Less than 1
b) Less than n
c) Less than m
d) Less than n/2
View Answer
Answer: a
Explanation: Hashing is also a method of sorting key values in a database table in an
efficient manner.
2. A technique for direct search is
a) Binary Search
b) Linear Search
c) Tree Search
d) Hashing
View Answer
Answer: d
Explanation: Hashing is one way to enable security during the process of message
transmission when the message is intended for a particular recipient only.
3. The searching technique that takes O (1) time to find a data is
a) Linear Search
b) Binary Search
c) Hashing
d) Tree Search
View Answer
Answer: c
Explanation: A formula generates the hash, which helps to protect the security of the
transmission from unauthorized users.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate
Now!
advertisement
4. The goal of hashing is to produce a search that takes
a) O(1) time
b) O(n2 )time
c) O(log n ) time
d) O(n log n ) time
View Answer
Answer: a
Explanation: Time complexity is given by the big oh notation.
5. Consider a hash table of size seven, with starting index zero, and a hash function (3x
+ 4)mod7. Assuming the hash table is initially empty, which of the following is the
contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using
closed hashing? Note that ‘_’ denotes an empty location in the table.
a) 8, _, _, _, _, _, 10
b) 1, 8, 10, _, _, _, 3
c) 1, _, _, _, _, _,3
d) 1, 10, 8, _, _, _, 3
View Answer
Answer: b
Explanation: A formula generates the hash, which helps to protect the security of the
transmission from unauthorized users.
Check this: RDBMS MCQ | Programming Books
6. A hash table can store a maximum of 10 records, currently there are records in
location 1, 3,4,7,8,9,10. The probability of a new record going into location 2, with hash
functions resolving collisions by linear probing is
a) 0.1
b) 0.6
c) 0.2
d) 0.5
View Answer
Answer: b
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
7. Key value pairs is usually seen in
a) Hash tables
b) Heaps
c) Both Hash tables and Heaps
d) Skip list
View Answer
Answer: a
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
8. What is the best definition of a collision in a hash table?
a) Two entries are identical except for their keys
b) Two entries with different data have the exact same key
c) Two entries with different keys have the same exact hash value
d) Two entries with the exact same key have different hash values
View Answer
Answer: a
Explanation: This level is the root of the tree.
9. Which of the following scenarios leads to linear running time for a random search hit
in a linear-probing hash table?
a) All keys hash to same index
b) All keys hash to different indices
c) All keys hash to an even-numbered index
d) All keys hash to different even-numbered indices
View Answer
Answer: a
Explanation: If all keys hash to the same location then the i-th inserted key would need i
lookups to be found. The probability of looking up i-th key is 1/n (since it’s random). If
you know some probability it’s trivial to show that such lookups have linear time.
10. Breadth First Search is used in
a) Binary trees
b) Stacks
c) Graphs
d) All of the mentioned
View Answer
Answer: c
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
Database Management System MCQ (Multiple Choice
Questions)
1. What is the full form of DBMS?
a) Data of Binary Management System
b) Database Management System
c) Database Management Service
d) Data Backup Management System
View Answer
Answer: b
Explanation: DBMS is abbreviated as Database Management System. Database
Management System stores the data and allows authorized users to manipulate and
modify the data.
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and
managed
d) Organized collection of data that cannot be updated
View Answer
Answer: c
Explanation: It is defined as an organized collection of data or information for easy
access, updating, and management in a computer.
3. What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
View Answer
Answer: d
Explanation: DBMS is nothing but a storehouse wherein the authorized user can create
a database to store, modify or retrieve the organized data in the table. It can be modified
or retrieved by users who have access to DBMS only.
4. Who created the first DBMS?
a) Edgar Frank Codd
b) Charles Bachman
c) Charles Babbage
d) Sharon B. Codd
View Answer
Answer: b
Explanation: Charles Bachman along with his team invented the first DBMS known as
Integrated Data Store (IDS).
5. Which type of data can be stored in the database?
a) Image oriented data
b) Text, files containing data
c) Data in the form of audio or video
d) All of the above
View Answer
Answer: d
Explanation: The reason for creating the database management system was to store
large data and these data can be of any form image, text, audio, or video files, etc.
DBMS allows the users to store and access the data of any format.
advertisement
6. In which of the following formats data is stored in the database management system?
a) Image
b) Text
c) Table
d) Graph
View Answer
Answer: c
Explanation: The data is stored in a table format intended to manage the storage of data
and manipulate stored data to generate information.
7. Which of the following is not a type of database?
a) Hierarchical
b) Network
c) Distributed
d) Decentralized
View Answer
Answer: d
Explanation: Different types are:
1) Centralized
2) Distributed
3) Relational
4) NoSQL
5) Cloud
6) Object-oriented
7) Hierarchical
8) Network
8. Which of the following is not an example of DBMS?
a) MySQL
b) Microsoft Acess
c) IBM DB2
d) Google
View Answer
Answer: d
Explanation: MySQL, Microsoft Access, IBM DB2 are database management systems
while Google is a search engine. MySQL is a Linux-based database management
system, Microsoft Access is a tool that is a part of Microsoft Office used to store data,
IBM DB2 is a database management system developed by IBM. Google’s Bigtable is the
database that runs Google’s Internet search, Google Maps, YouTube, Gmail, and other
products.
9. Which of the following is not a feature of DBMS?
a) Minimum Duplication and Redundancy of Data
b) High Level of Security
c) Single-user Access only
d) Support ACID Property
View Answer
Answer: c
Explanation: Single-user Access only” is not a feature of DBMS. DBMS allows multiple
users to access and manipulate the database concurrently. It provides mechanisms to
handle concurrent access and ensure data consistency and integrity among multiple
users.
The important features of a database management system are:
1) Which of the following is generally used for performing tasks like creating the structure
of the relations, deleting relation?
Answer: D
Explanation: The term "DDL" stands for Data Definition Language, used to perform all
other essential tasks such as deleting relation and related schemas in defining the
structure relation.
2) Which of the following provides the ability to query information from the database and
insert tuples into, delete tuples from, and modify tuples in the database?
Answer: A
Explanation: The term "DML" stands for the Data Manipulation Language used to
perform the required changes in the relation's values.
3) The given Query can also be replaced with_______:
Answer: B
Explanation: Join clause joins two tables by matching the common column
4) Which one of the following given statements possibly contains the error?
Answer: D
Explanation: The Query given in option D does not contain the "from" clause, which
specifies the relation from which the values have to be selected or fetched. Therefore
the correct answer is D.
1. SELECT emp_name
2. FROM department
3. WHERE dept_name LIKE ' _____ Computer Science';
In the above-given Query, which of the following can be placed in the Query's blank
portion to select the "dept_name" that also contains Computer Science as its ending
string?
a. &
b. _
c. %
d. $
Answer: C
Explanation: In the above-given Query, the "%" (like) operator will be used, which is
generally used while searching for a certain pattern in the strings. It represents the
single and multiple characters. In this case, it used with "Where "louse to select the
"dept_name" that contains the Computer Since as its ending string. To understand it
more clearly, consider the following syntax:
Syntax
Answer: B
Explanation: We can understand the "one to many" relationship as a teacher who may
have more than one class to attend.
7) In the following Query, which of the following can be placed in the Query's blank portion
to display the salary from highest to lowest amount, and sorting the employs name
alphabetically?
1. SELECT *
2. FROM instructor
3. ORDER BY salary ____, name ___;
a. Ascending, Descending
b. Asc, Desc
c. Desc, Asc
d. All of the above
Answer: C
Explanation: To sort the salary from highest to lowest amount and display the
employee's name alphabetically, one can use the "Desc and Asc" in the above-given
Query.
1. SELECT name
2. FROM instructor1
3. WHERE salary <= 100000 AND salary >= 90000;
a.
1. SELECT name
2. FROM instructor1
3. WHERE salary BETWEEN 100000 AND 90000
b.
1. SELECT name
2. FROM instructor|
3. WHERE salary BETWEEN 90000 AND 100000;
c.
1. SELECT name
2. FROM instructor1
3. WHERE salary BETWEEN 90000 AND 100000;
d.
1. SELECT name
2. FROM instructor!
3. WHERE salary <= 90000 AND salary>=100000;
Answer: C
Explanation: The "SQL" contains a comparison known as the "BETWEEN," which is also
used in one of the given queries, as you can see. The "BETWEEN" operator is generally
used to simplify the "WHERE" clause that is used to specify that the value is greater
than one value or greater than some values, less than one or more values.
Answer: A
Answer: B
Explanation: The term "FAT" can be described as a file structure (or file architecture).
In which all the information about the files where they are stored and where all these
files need to be stored or in which directory, all that information generally stored in
the file structure. Therefore the Operating system creates a table in which all the files
and clusters are stored, known as the file allocation table.
11) Which of the following can be considered as the maximum size that is supported by
FAT?
a. 8GB
b. 4GB
c. 4TB
d. None of the above
Answer: B
Explanation: The files with a size of less than 4 GB or equal to 4GB are easily supported
by the FAT. All files with a size greater than the maximum size (or is 4Gb) are not
supported by the FAT.
Explanation: In the old operating systems, the file structure used to store and manage
files is called the FAT 32 ( or File Allocation Table). Later, when the technology evolves
with time, a new type of file system is introduced, known as the New Technology File
System. It overcomes all the drawbacks, issues that exist in FAT file architecture and
has many other new features such as it is fast, it can handle files whose size is even
greater than 4 GB.
13) Which of the following can be considered as the maximum size that is supported by
NTFS?
a. 4GB
b. 16TB
c. 64TB
d. 8TB
Answer: A
Explanation: The New Technology File System was introduced in 1993 for the very
first time as a part of new Windows operating systems (Windows NT 3.1).
You may be surprised to know that windows are still using it because of its fast speed
and can support files whose size is up to 16TB (16 terabytes), which is much more than
that file size supported by the old system.
14) A huge collection of the information or data accumulated form several different
sources is known as ________:
a. Data Management
b. Data Mining
c. Data Warehouse
d. Both B and C
Answer: C
Explanation: A huge collection of different types of data/information which collected
from many different sources stored in one place is called a data warehouse. It works
just like the standard warehouse, which is generally a type of holding area/building to
store the different types of different goods in huge quantities until they are further
distributed. Therefore the correct answer is Data Warehouse.
15) Which of the following can be used to extract or filter the data & information from the
data warehouse?
a. Data redundancy
b. Data recovery tool
c. Data mining
d. Both B and C
Answer: C
Explanation: The tools used to obtain meaningful information or Data from the large
collection of data (or from the Data Warehouses) are known as the Data mining tools.
Through data mining, one can easily filter the useful information or data from the
massive collection of the data. Therefore the correct answer is Data Mining.
16) Which one of the following refers to the copies of the same data (or information)
occupying the memory space at multiple places.
a. Data Repository
b. Data Inconsistency
c. Data Mining
d. Data Redundancy
Answer: D
Explanation: The data redundancy generally occurs whenever more than one copy of
the exact same data exists in several different places. Sometimes it may cause data
inconsistency, which can result in an unreliable source of data or information that is
not good for anyone.
17) Which one of the following refers to the "data about data"?
a. Directory
b. Sub Data
c. Warehouse
d. Meta Data
Answer: D
Explanation: The Mata Data refers to the type of data that describes the other data or
information.
A general file or document is nothing more than a sequence of bytes that contains
information like file name, file size, and date & time when the document was created
or modified.
For a common music file, the metadata may include the singer's name, the year it was
released, and the lyrics, etc.
18) Which of the following refers to the level of data abstraction that describes exactly
how the data actually stored?
a. Conceptual Level
b. Physical Level
c. File Level
d. Logical Level
Answer: B
Explanation: Data abstraction means displaying or sharing only the data that is
needed and hiding from all other data until it is necessary to share it. However, the
data abstraction level that describes how the data was actually stored in the user's
machine (or system) is known as the Physical level. Therefore the correct answer is B.
19) To which of the following the term "DBA" referred?
Answer: B
Explanation: The term "DBA" refers to the Database Administrator that manages the
whole database and updates the database on a regular basis. In short, the database
administrator has the responsibility of the whole database and to maintain it in an
optimal & stable state.
Answer: D
Answer: C
Explanation: In general, the term "data" refers to the row facts and figure, whereas
the information referred to as the data, which is really important for someone or a
particular person. Therefore the correct answer is C.
a. Degree
b. Tuples
c. Entity
d. All of the above
Answer: D
a. Entity
b. Column
c. Cardinality
d. None of the above
Answer: C
Suppose we have a relation (or table) that contains 30 tuples (or Rows) and four
columns, so the cardinality of our relation will be 30.
a. Create
b. Alter
c. Delete
d. All of the above
Answer: C
Explanation: In data manipulation language, the command like select, insert, update,
and delete is used to manipulate the information (or data, records), for example create
a table, update table delete table, etc. Therefore the correct answer is C.
25) Which of the following command is a type of Data Definition language command?
a. Create
b. Update
c. Delete
d. Merge
Answer: A
Explanation: The Data definition language is generally used to maintain or define the
structure of the database. For example, creating a table, drop table, alter table. In short,
we can say that the command of data definition languages is used to work on the
table's schemas inside the database.
26) Which of the following is a top-down approach in which the entity's higher level can
be divided into two lower sub-entities?
a. Aggregation
b. Generalization
c. Specialization
d. All of the above
Answer: C
In the specialization, the higher-level entity can be divided into sub lower entities. It is
generally used for identifying the subset of an entity set which share the distinguishing
characteristics.
Suppose you have an entity, e.g., A vehicle. So through the specialization, you can be
divided further into sub-entities like two-wheelers and four-wheelers. Therefore the
correct answer is C.
27) In which one of the following, the multiple lower entities are grouped (or combined)
together to form a single higher-level entity?
a. Specialization
b. Generalization
c. Aggregation
d. None of the above
Answer: B
Explanation:
The bottom-up approach is used in the generalization. The several lower-level sub-
entities are grouped together to make an individual higher-level entity. In short, we
can say that it is totally the opposite of specialization. To understand it more clearly,
consider the following example:
Example
Suppose you have several lower entities like bus, car, motorbike etc. So, in order to
make a more generalize (or higher level ) entity, you can combine them under a new
higher-level entity such as a vehicle.
28) In a relation database, every tuples divided into the fields are known as the______.
a. Queries
b. Domains
c. Relations
d. All of the above
Answer: B
Explanation: In a database, the number of rows inside a table is known as tuples, and
if we further divide those tuples (or rows) into those fields, they become the domains.
So the correct answer will be B.
Answer: D
Explanation: The term "TCL" refers to the Transaction Control Language, which is
another language just like the "DDL" and "DML". The commands like commit, save
point, rollback come under the TCL used to control the transactions. Therefore the
correct answer will be D.
30) In the relational table, which of the following can also be represented by the term
"attribute"?
a. Entity
b. Row
c. Column
d. Both B &C
Answer: C
Explanation: In the database, the number of rows inside a table is called the tuples,
and the numbers of columns are known as the attributes. Therefore the correct answer
is C.
a. Degree
b. Row
c. Column
d. All of the above
Answer: A
Explanation: The column inside the table is called the attribute, and the total number
of attributes inside the table is called the degree. So, here as we can see, degree refers
to the number of attributes in a relation. Therefore the correct answer is C.
32) Which of the following is used in the application programs to request data from the
database management system?
Answer: A
Explanation: To fetch data from the database management system, generally, the
"select" statement is used. Therefore, the Data Manipulation Language is used in the
application programs while requesting the data from the database management
system.
33) Which one of the following command is used to delete the existing row in a table?
a. Delete
b. Update
c. Insert
d. None of the above
Answer: A
Explanation: To delete an existing row in a table the generally, the "delete" command
is used. The "delete" command is one of the commands that belong to the Data
manipulation language.
34) Which of the following commands is used to save any transaction permanently into
the database?
a. Commit
b. Rollback
c. Savepoint
d. None of the above
Answer: A
Explanation: The Transaction Control Language is used while working with the
transactions. To save any transaction permanently into the database generally, the
"commit" command is used, by which any changes get reflected permanently into the
database, and they become irreversible.
35) Which one of the following commands is used for removing (or deleting) a relation
forms the SQL database?
a. Delete
b. Drop
c. Remove
d. All of the above
Answer: B
36) Which one of the following commands is used to restore the database to the last
committed state?
a. Savepoint
b. Rollback
c. Commit
d. Both A & B
Answer: B
Explanation: As we all know that while working with the Transactions, the Transaction
Control Language is used. To restore the database to the last committed state ( or to
undo the latest changes), the "rollback" command is used that belongs to the
Transaction Control Language.
37) The database management system can be considered as the collection of ______ that
enables us to create and maintain the database.
a. Translators
b. Programs
c. Keys
d. Language activity
Answer: B
Explanation: The Database management system can also considered as the set of
programs that enables users to create and maintain the database.
Answer: C
Explanation: The term"DFD" stands for the Data Flow Diagram, and to represent the
flow of the data( or information), the data flow diagram is used. The data flow diagram
also helps in understanding how the data is managed in the application. Therefore the
correct answer is C.
39) Which of the following refers collection of the information stored in a database at a
specific time?
a. Independence
b. Instance of the database
c. Schema
d. Data domain
Answer: B
Answer: C
Explanation: The term "SQL" stands for the structured query language, which is one
of the most widely, used programming languages for relational databases. It can also
be used for managing and organizing data in all sorts of systems in which different
data relationships exist. Therefore the correct answer is C.
Answer:
Explanation: The term "Data independence" refers that the program should not be
dependent on either the logical attributes of data or physical attributes of data.
Answer: B
43) Which one of the following refers to the total view of the database content?
a. Conceptual view
b. Physical view
c. Internal view
d. External view
Answer: A
Explanation: The conceptual view refers to the total view of the content available in
the database. Therefore the correct answer is A.
Answer: B
Explanation: The term "DML" refers to the data manipulation language, which is
commonly used to perform basic operations such as insert data, delete, and update
data in a database. So the correct answer will be B.
Answer: C
Explanation: The term "ODBC" refers to the Open Database Connectivity that is a SQL
based programming interface introduced by Microsoft.
a. One level
b. Two-level
c. Three-level
d. Four level
Answer: C
Explanation: A database's architecture can be viewed as the three levels of abstraction
that are named as the internal level, external level, and the conceptual level. Therefore
the correct answer is C.
47) In the relation model, the relation are generally termed as ________
a. Tuples
b. Attributes
c. Rows
d. Tables
Answer: D
Explanation: In the relation model, the relations are also referred to as the tables
because the relations are considered as the technical name of the table. So the correct
answer is D.
48) The Database Management Query language is generally designed for the _____
Answer: D
49) Which of the following keys is generally used to represents the relationships between
the tables?
a. Primary key
b. Foreign key
c. Secondary key
d. None of the above
Answer: B
50) Which of the following levels is considered as the level closed to the end-users?
a. Internal Level
b. External Level
c. Conceptual Level
d. Physical Level
Answer: B
Explanation: The database's external level is the one and only level that is considered
the closest level to the end-users. So the correct answer will be the B.
51) A computer security protocol for logging-in can be considered as the example of the
______ component of an information system.
a. Data
b. Software
c. Procedure
d. Hardware
Answer: C
Explanation: A computer security protocol for logging-in can be considered as the
procedure component of an information system. Therefore the correct answer is C.
52) Which one of the following keyword is used to find out the number of values in a
column?
a. TOTAL
b. COUNT
c. SUM
d. ADD
Answer: B
Explanation: The "COUNT" keyword is used to find the total number of values inside
a column. So whenever a user wants to find the total values in a column, he can use
the keyword "COUNT".
53) Which one of the following is commonly used to define the overall design of the
database?
a. Application program
b. Data definition language
c. Schema
d. Source code
Answer: C
Explanation: In order to define the overall design of the database, generally, the
schema is used. Therefore the correct answer is C.
54) Which one of the following commands is used to modify a column inside a table?
a. Drop
b. Update
c. Alter
d. Set
Answer: C
An ethical hacker must ensure that proprietary information of the firm does not
get leaked.
A. True
B. False
After performing ____________ the ethical hacker should never disclose client
information to other parties.
A. hacking
B. cracking
C. penetration testing
D. exploiting
A. Cyber-ethics
B. Social ethics
C. Cyber-bullying
D. Corporate behavior
A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors
Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm
Leaking your company data to the outside network without prior permission of
senior authority is a crime.
A. True
B. False
___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms
8. e-commerce means
a. electronic commerce
b. electronic data exchange
c. electric data exchange
d. electronic commercialization.