0% found this document useful (0 votes)
233 views160 pages

Tong Hop - Share Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
233 views160 pages

Tong Hop - Share Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 160

1.

A(n)___ list is also known as a queue (choose 1)


A. LiFO
B.FIFO
C. unordered
D. ordered

2.If the exponent in Excess_127 is binary 10000101=133, the exponent in decimal is


A. 6(133-127)
B. 7
C. 8
D. 9

3. Off-line operation is the operation of devices without the control of


A. Memory
B. CPU
C. ALU
D. Control unit
E. None of the above

4. Personnel who design, program, operate and maintain computer equipment refers to
A. Console-operator
B. Programmer
C. Peopleware
D. System Analyst
E. None of the above

5. In two’s complement representation with a 4-bit allocation, we get__ when we add 5 to


5 (5 = 0101, bù 1 = 1010, bù 2 (=bù 1 + 1) = 1011 = -3)
A. -5
B. -6
C. -7
D. 10

6. The operation that takes two relations and combines them based on common
attributes is the operation
A. join
B. project
C. union
D. intersection

7.___ is a program that facilitates the execution of other programs.


A. An operating system
B. Hardware
C. A queue
D. An application program

8. In the___ graphic method of representing an image in a computer, the image is


decomposed into a combination of geometrical figures.
A. Bitmap
B.vector
C.quantized
D.binary
9.In an Excess conversion, we __ the number to be converted.
A. add the bias number to
B. subtract the bias number from
C. multiply the bias number by
D. divide the bias number by

10.To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then___ the
bit pattern and the mask.
A. AND
B. OR
C. XOR
D. NOT

11. A generalised software package produced to meet the bugs of a variety of data
processing users is known as
A. Utility programs
B. System software
C. Operating system
D. Application package
E.None of the above

12. Each element in a record is called


A. a variable
B. an index
C a field
D a node

13. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilitarianism
C. social contract
D. none of the above

14. What is the domain name in the email address [email protected]?


A. kayla
B. [email protected]
C. nasa.gov
D. gov

15. Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B Microcomputers
C Mainframe computers
D. Supercomputers
E. None of the above

16. The pop operation ___ of the stack.


A. deletes an item from the top
B. deleted an item from the bottom
C. inserts an item at the top
D. inserts an item at the bottom
17. A___ is simply an arrangement where multiple disk drives appear as a single disk
drive to the user
A. disk
B. disk array
C. bunch of disks
D. disk pack
E. spanned drive

18. A stack is a ___ structure.


A. FIFO
B. LIFO
C. DIFO
D. SIFO

19. A notation used to express clearly on algorithm is known as


A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the above

20. The unary___ operator invest its single input.


A. AND
B. OR
C. NOT
D. XOR

21. When a sequential file is updated, the ___ file contains a list of all errors occurring
during the update process
A. new master
B. old master
C. transaction
D. error report

22.______ means concealing the contents of a message by enciphering


A. Steganography
B. Cryptography
C. compressing
D. Authentication

23. The no of logical records in a physical record is


A. Group
B. Blocking factor
C Sector
D Field
E None of the above

24. If the transaction file key is 20 with a delete code and the master file key is 20, then
we___
A. add the transaction to the new master file
B. revise the contents of the old master file
C. delete the data
D. write the old master file record to the new master life

25. An empty linked list consists of __


A. a node
B. two nodes
C. data and a link
D. a null head pointer

26.___ is a declarative language used on relational databases.


A. PDQ
B SQL
C LES
D PBJ

27 Which of the following is the expansion of EBCDIC


A Extended bit comparable to digital interface for computer
B Extended bootable computerised digital infrared calculator
C Extended binary coded decimal interchange code
D Extended binary coded decimal information code
E None of the above

28 After a sequential file is updated, the___ file contains the most current data
A new master
B old master
C transaction
D error report

29 Each row in a relation is called ___


A an attribute
B a tuple
C a union
D an attitude

30. ___ means that the sender and the receiver expect confidentiality
A Non Repudiation
B integrity
C Authentication
D encryption and decryption

31. A hybrid computer used a ___ to convert digital signals from a computer into analog
signals
A. Modulator
B Demodulator
C Modem
D Decoder
E None of the above

32. In___ , the program can be divided into differently sized sections
A. partitioning
B paging
C demand paging
D demand segmentation

33 A byte consists of __ bits


A2
B4
C8
D 16

34 We use a ___ search for an unordered list


A sequential
B binary
C bubble
D insertion

35 Testing a software system can involve ___ testing


A black-box
B glass-box
C neither black-box nor glass-box
D both black-box and glass-box
36. _____ is an ordered collection of data in which each element contains the location of the
next element.

a. An array

b. A record

c. A linked list

d. A file

37. When a sequential file is updated, the ________ file gets the actual update.
a. New master
b. Old master
c. the transaction
d. the error report

38. The _______ manager is responsible for access to I/O devices.


a. memory
b. process
c. device
d. file

39. The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.
a. Unsigned
b. Sign-and-magnitude
c. two’s complement
d. one’s complement

40. The most important advantage of a video disk is


a. Compactness
b. Potential Capacity
c. Durability
d. Cost effectiveness
e. None of above

41. The first electronic special-purpose computer was called _______.


a. Pascal
b. Pascaline
c. ABC (Atanasoff–Berry computer)
d. ENIAC

42. In the system development process, writing the program is part of the _______ phase.
a. Analysis
b. Implementation
c. design
d. testing

43. ________ is a protocol for file transfer.


a. FTP
b. SMTP
c. HTTP
d. All of the above

44. A data item which is not broken into smaller units is _____
a. Data element
b. Elementary data item
c. Data entry
d. Database management
e. None of above

46. A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).
a. one, one
b. one, two
c. two, one
d. two, two

47. The ________ construct uses a set of actions one after another.
a. Sequence
b. Decision
c. repetition
d. flow

48. In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU
b. input/output
c. memory
d. control unit

49. If A is the first data element input into a stack, followed by B, C, and D, then ________ is the
first element to be removed.
a. A
b. B
c. C
d. D

50. An indexed file consists of_____


a. only a sequential data file
b. only an index
c. only a random data file
d. an index and random data file

51. a _____ controller is a high-speed serial interface that transfers data in packets.
a. SCSI
b. USB
c. FireWire
d. USB and FireWire

52. a type of channel used to connect a central processor and peripherals which uses
multiplying is known as
a. Modern
b. Network
c. Multiplexer
d. All of the above

e. None of the above

53. time during which a job is processed by the computer is


a. Delay time
b. Real time
c. Execution time
d. Down time
e. None of the above

54. The most common binary code in use today is the 8 bit ASCII code. What do the letters
ASCII stand for?
a. American Standard Code for International Interchange
b. American Standard Code for Information Interchange
c. American Standard Code for Intelligence Interchange
d. American Scientific Code for Information Interchange
e. None of the above

55. IP addresses are currently _______ bits in length.


a. 4
b. 8
c. 32
d. 40

56. A data structure can be _______.

a. only an array
b. only a record
c. only a linked list
d. an array, a record, or a linked list

57. Third generation computer


a. were the first to use integrated circuitry

b. were the first to use built-in error detecting devices

c. used transistors instead of vaccum tubes

d. All of the above

e. None of the above

58. In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures

a. bitmap

b. vector

c. quantized

d. Binary

59. Of the various database models, the ______ model is the most prevalent today.

a. hierarchical

b. network

c. relational

d. linked list

60. A storage system for small amounts of data is

a. Magnetic card

b. Magnetic tape

c. Punched card

d. Optical mark reader

e. None of the above

61. In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.

a. selection

b. bubble

c. insertion

d. None of the above


62. main storage is also called

a. Accumulator

b. Control unit

c. Register unit

d. Memory

e. None of the others

63. The base of the octal system is ____

a. 2

b. 8

c. 10

d. 16

64. Which of the following representations is erroneous?

a. (110)2

b. (141)8

c. (EF)16

d. 22A

65. Information about a product is that is kept secret by the owner is referred to as a ______

a. trade mark

b. trade secret

c. patent

d. Copyright

66. _______ is a set of instructions in a computer language that tells the computer what to do
with data.

a. An operating system

b. An algorithm

c. A data processor
d. A program

67. The ____ manager is responsible for archiving and backup.

a. memory

b. process

c. device

d. File

68. The base of the binary system is ____

a. 2

b. 8

c. 10

d. 16

69. An instruction that transfers program control to one or more possible paths is known as

a. Utility program

b. System software

c. Broadband channel

d. Application program

e. None of the above

70. A register in a cpu can hold _____

a. only data

b. only instructions

c. only program counter values

d. data, instructions, or program counter values


1. A modern electronic computer is a machine that is meant for
a. Doing quick mathematical calculations
b. Input storage, manipulation of outputting of data
c. Electronic data processing
d. Performing repetitive tasks accurately
e. None of the others
2. ___ means concealing the message by covering it with something else. a.
Cryptography
b. Steganography
c. Compressing
d. Authentication
3. In the attacks threatent integritive with ___ attack the attacker modifiles the
information to them
a. Snooping
b. Repudiation
c. Denial of service
d. Traffic analysis
4. The items are divided into two lists (sorted and unsorted) ___ sort. a.
Only in a selection
b. Only in a bubble
c. Only in an insertion
d. In selection, bubble, or insertion
5. ___ is a popular object-oriented language.
a. FORTRAN
b. COBOL
c. Java
d. LISP
6. Each row in a relation is called ___
a. An attribute
b. A tuple
c. A union
d. An attitude
7. In a ___ the project team needs to choose a language or a set of languages from
among it languages
a. Analysis phase
b. Design phase
c. Implementation phase
d. Testing place
8. The ___ of ethics says an act is ethical if a majority of people in society agree with it a.
Moral rules
b. Social contract
c. Utilization
d. Nonmaleficence
9. What type of OS evolution that need for more speed and efficiency led to the design
with multiple CPUs on the same machine?
a. Personal systems
b. Distributed systems
c. Parallel systems
d. Real-time systems
10. ___ explicitly defines connection establishment, data transfer, connection teardown
phases to provide a connection-oriented service AND reliable
a. TCP
b. UDP
c. IP
d. HTTP
11. What is statement that stores the value in the variable, which has already been created
in the declaration section. We use the symbol ← in our algorithm to define it?
a. Compound statement
b. Assignment statement
c. Control statement
d. None of above
12. Arithmetic right shift is used to ___ an integer by two
a. Addition
b. Subtraction
c. Divide
d. Multiply
13. A ___ is a collection of related elements possibly of different types having a single
name
a. Array
b. Record
c. Linked list
d. Tree
14. Inside the ADT are two different parts of the model that are ___ and ___
a. Data structure and operations
b. Application program and public operations
c. Application program and private operations
d. Data structure and application program
15. A device that prints one character at a time is known as
a. Laser printer
b. Line printer
c. Character printer
d. Dot-Matrix printer
e. None of the others
16. A register in a CPU can hold ___
a. Only data
b. Only instructions
c. Only program counter values
d. Data, instructions, or program counter values
17. In the ___ we can think of a program as an active agent that manipulates
passive objects.
a. Procedural paradigm
b. Functional paradigm
c. Declarative paradigm
d. Object-oriented paradigm
18. Conversion of binary number 1010101000010111 to hexadecimal number is ___
a. D8F9
b. A8B9
c. AA17
d. D9F8
e. None of the others
19. The term users in a DBMS has a broad meaning. We can divide users into:
a. End users and database administrators
b. End users and normal users
c. Application programs and end users
d. Application programs and database administrators
20. In the data link layer, Standard Ethernet is ___
a. 10 Mbps
b. 100 Mbps
c. 1 Gbps
d. 10 Gbps
21. Testing a software system can involve ___ testing
a. Black-box
b. Glass-box
c. Neither black-box nor glass-box
d. Both black-box and glass-box
22. A memory that does not change its contents without external causes is known as a.
Dynamic memory
b. Static memory
c. RAM
d. EEPROM
e. None of the others
23. The combination of sign and mantissa of a real number in IEEE standard floating
point format is stored as an integer in the ___ representation.
a. Unsigned
b. Sign-and-magnitude
c. Two’s complement
d. One’s complement
24. The software used to convert source program instructions to object instruction is
known as
a. Compiler
b. Assembler
c. Interpreter
d. Language processor
e. None of the others
25. In peripheral device management, what is the principle of hierarchical work on OS of
third-generation computers?
a. Processor - Peripheral device - Control device
b. Processor - Control device - Peripheral device
c. Control device - Peripheral device - processor
d. None of the answers are correct
26. In ___ cryptography, everyone has access to everyone’s public key. a.
Symmetric-key
b. Asymmetric-key
c. Secret-key
d. private-key
27. In the hierarchical database model, data is organized as an inverted ___ a.
Graph
b. Tree
c. Array
d. Record
28. The ___ manager is responsible for archiving and backup
a. Memory
b. Process
c. Device
d. File
29. What is quality referring to the ability to move software from one hardware platform to
another
a. Flexibility
b. Interoperability
c. Resusability
d. Changeability
30. Which is a unit representing the no bits of discrete
a. Baud
b. Byte
c. Bit
d. All of the others
e. None of the others
31. What is the name of the computer which was first used for programming and playing of
music?
a. ELLIAC
b. ENIAC
c. UNIVAC
d. All of the others
e. None of the others

32. An index register that is automatically incremented or decremented with each use is?
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others
33. The_______contruct uses a set of actions one after another.
A. Sequence
B. Decision
C. Repetition
D. Flow
34. The base of the binary system is_____?
A. 2
B. 8
C. 10
D. 16
35. The most important advantage of a video disk is______
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
36. ______ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
37. In the_______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary
38. Main memory is the second major subsystem in a computer. It consists of a collection of
storage locations, each with a unique identifier, called an_____?
A. Values
B. Address
C. Bit
D. Words
39. A process in the ready state goals to the running state when_____.
A. It enters memory
B. It request I/O
C. It get access to the CPU
D. It finishes running
40._______ is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
41. In ______ paradigm, the service provider is an application program, it runs continuously,
waiting for another application program, then to make a connection through the Internet and ask
for service.
A. P2P
B. Traditional
C. Client-server
D. Model
42. In a stream cipher encryption and decryption are done one symbol. We have a plaintext
stream a ciphertext stream and a______
A. Key block
B. Single Key
C. Key stream
D. Auto key
43. In monoprogramming, most of the memory capacity is dedicated to a__if we consider the
data to be processed by a program as part of the program.
A. Single program
B. Multi program
C. Address location
D. Set of instruction
44. How can we set name of nodes in a linked list?
A. Depend on the user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
45. There are serval methods for handling address collisions and each of them ___of the
hashing algorithm.
A. Independent
B. Dependent
C. Base on
D. Related
46. Defining the users, requirements, and methods is part of the ____ phase
A. Analysis
B. Design
C. Implementation
D. Testing
47. The_____in the TCP/IP protocol suite is responsible for the host-to-host delivery of the
messages.
A. Physical
B. Data-link
C. Network
D. Transport
48. If personal information about each employee in a company is stored in a file we can
use____ access to retrieve each record at the end of the month to print the paychecks. A.
Hashed file
B. Sequential file
C. EOF
D. Index file
49. The attack that reduces the capabilit of a computer is called a______ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
50. A company’s product or service is identified as a_______
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
51. The operation that takes two relations and combines the based on common attributes is
the ______ operation.
A. Join
B. Project
C. Union
D. Intersection
52. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the others
53. An_____ of a binary search tree (BST) creates a list that is sorted min ascending order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
54. An indexed file consists of______.
A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55. Each node in a graph can have ______parents
A. Only one
B. No node
C. One or more
D. At most two node
56. The enqueue operation___ an item at the _____ of the queue
A. Delete front
B. Delete end
C. Inserts front
D. Insert rear
57. A mechanism for arranging controlled access to a shared resource is
A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others
58. The octal equivant of 1100101.001010 is
Grouping in groups of three

A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the others
59. RISC (reduced instruction set computer). The strategy behind RISC architecture is to
have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
60. A data structure can be_____
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
1.Before a disk drive can access any sector record ,a computer program has to provide the
record’s address .What information does this address specify?
A.Track number
B.Sector number
C.Surface number
D.All of above
E.None of the above

2.The unit of a computer that executes program,communicates with and often controls the o
other subsystems of the computer is known as
A.CPU
B.Control unit
C.I/O unit
D.Peripheral unit
E.None of above.

3.A hybrid computer uses a ____ to convert digital signals from a computer into analog
signals.

Modem is short for "Modulator / Demodulator."


A.Modulator
B.Demodulator
C.Modem
D.Decoder
E.None of above.

4.____ is a measure of how tightly two modules are bound to each other.
A.Modularity
B.Coupling
C.Interoperability
D.Cohesion.

5.Registers which are partially visible to user and used to hold conditional codes (bits set by
the CPU as the result of operations), are known as
A.PC
B.Memory Address Registers
C.General purpose registers
D.Flags
E.None of above

6.Off-line operation is the operation of devices without the control of


A.Memory
B.CPU
C.ALU.
D.Control unit
E.None of the above

7. A type of channel used to connect a central processor and peripherals which uses
multiplying is known as
A.Modern
B.Network
C.Multiplexer
D.All of the above
E.None of above

8.Which is used to store firmware


A.RAM
B.ROM
C.PROM
D.EPROM
E.None of above

9.____ is a process in which an algorithm calls itself

A.Insertion
B.Searching
C. Recursion
D.Iteration

10.Which printer uses a combination of laser-beam & electro photographic techniques.


A.Laser printer
B.Dot-Matrix
C.Line printer
D.Daisy wheel
E.None of above

11.The difference between memory and storages is that memory is__ and storage is ___
A.Temporary, permanent
B.Permanent, temporary
C.Slow, fast
D.All of above
E.None of the above

12.In a three - level DBMS architecture, the ___ level interacts directly with the users
A. external
B. conceptual
C. interal
D. Physical
13.____ is a declarative language used on relational databases
A.PDQ
B.SQL
C.LES
D.PBJ

14. In postorder traversal of a perfect binary tree, the left subtree is processed____
A.first
B.second
C.last
D.after the right subtree

15.The list coded instructions is called


A. Computer program
B. Algorithm
C. Flowchart
D. Utility programs
E. None of the others
16. _____ is a protocol for e mail services
A. FTP
B. SMTP
C. TELNET
D. HTTP
17. Three security goals are____
A. confidentially, cryptography, and nonrepudiation
B. confidentially, encryption, and decryption
C. confidentially, integrity, and avalability
D. confidentially, denial of service, and masquerading
18. A computer assisted method for the recording and analyzing of existing or hypothetical
system
A.Data transmission
B.Data flow
C.Data capture
D.Data processing
E.None of the above

19. The pop operation____ of the stack.


A.deletes an item from the top
B.deletes an item from the bottom
C.deletes an item at the top
D.deletes an item at the bottom
20. The octal equivalent of 1100101.001010 is___
A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the above
21. data item which is not broken down into smaller units is___
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. Nine of the above
22. A stand-alone system which produces one page of printed output at a time is
A. Page printer
B. Line printer
C. Laser printer
D. Dot matrix printer
E. None of the above
23. To traverse a list, you need a ___ pointer.
A. null
B. walking
C. beginning
D. insertion
24. The index of an indexed file has___fields
A. two
B. three
C. four
D. any numbers of
25. In an inorder traversal of a perfect binary tree, the root is processed____.
A. first
B. second
C. last
D. two times
26. A byte consists of____ bits
A. 2
B. 4
C. 8
D. 16
27.____is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
28. The address product by a hashing algorith is the___address.
A. probe
B. synonym
C. collision
D. home
29. The___ is a computer subsystem that performs operations on data.
A. CPU
B. memory
C. I/O hardware
D. bus subsystem
30. An empty linked list consists of___
A. a mode
B. two mode
C. data and a link
D. a null head pointer
31. When we want to store music in a computer, the audio signal must be___.
A. sampled only
B. quatized only only
C. coded only
D. sampled, quatized and coded
32. When a sequential is updated, the___ file contains a list of all errors occurring during the
update process.
A. new master
B. old master
C. transaction
D. error report
33. AI input must be ON position to have an output is known as
A. NOT gate
B. AND gate
C. OR gate
D. XOR gate
E. None of the above
34. In the system development process, structure charts are tools used in the__phase.
A. analysis
B. design
C. implementation
D. testing
35. Each column in a relation is called____.
A. an attribute
B. a tuple
C. a union
D. an attitude
36. A___ program can be either an application or an applet.
A. FORTRAN
B. C++
C. C
D. Java
37.The___manager is responsible for archiving and backup.
A. memory
B. process
C. device
D. file

38. The attack that reduces the capacity of a computer is called a______ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
39. In the third generation of computers:
A. distributed data processing first became popular
B. an operating system was first developed
C. high-level procedural languages were first used
D. on-line, real time systems first became popular
E. All of the above
40. I a linked list, each element contains_____
A. only data
B. only a link
C. neither data nor a link
D. data and a link
41. The combination of sign and mantissa of a real number in IEEE standard floating point
format is integer in the______ representation.
A. unsigned
B. sign-and-magnitude
C. two’s complement
D. one’s complement
42. Any device that performs signal conversion is
A. Moduator
B. Modem
C. Keyboard
D. Plotter
E. None of the above
43. For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement for
A. 8
B. 127
C. 128
D. 256
44. A device that prints one character at a time is know as
A. Laser printer
B. line printer
C. Character printer
D. Dot-Matrix printer
E. None of the above
45. A right to a monopoly to use a pice of intellectual property is referred to as_____
A. trade mark
B. trade secret
C. patent
D. copyright
46. The operation that takes two relations and combines them based on common attributes is
the_____ operation
A. join
B. project
C. union
D. intersection
47. If A is the first data element input into a queue, followed by B,C, and D, then_____ is the
first remove
A. A
B. B
C. C
D. D
48. A computer language that is written in binary codes only is_____
A. machine language
B. C
C. C#
D. pascal
E. None of the above
49. In________ traversal of a perfect binary tree, the left subtree is processed second
A. preorder
B. inorder
C. postorder
D. out of order
50. The layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame
two adjacent nodes
A. transport
B. network
C. date-link
D. session
51. The organization and interconnection of the various components of a computer system is
A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the above
52. How many symbols can be represented by a bit pattern with ten bits?
A. 128
B. 256
C. 512
D. 1024
53. The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the above
54. ______ Is a stand-alone storage location that holds data temporarily
A. An ALU
B. A register
C. A control unit
D. A tape drive
55. _______ operator (s) takes two inputs to produce one output
A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR
56. A data item which is not broken down into smaller units is______
A. Data element
B. Elementary data item
C. Data entry
D. Database management
E. None of the above
57 :______ protocol(s) is one of the protocols in the transport layer
A : Only TCP
B : Only UDP
C : Only SCTP
D : TCP , UDP and SCTP
58 : The base of the octal number system is
A: 2
B: 8
C: 10
D:16
59: ____ is an arithmetic operation
A : The exclusive OR
B : The unary NOT
C : Subtraction
D: The binary AND
60 : When a sequential file is updated , the __ file contains the changes to be applied
A : New master
B : Old master
C : Transaction
D : Error Report
61 : Each element in a record is called ___
A: a variable
B an index
C:a field
D:a node
62 : The RSA algorithm for confidentially uses ____ cryptography
A: asymmetric-key
B:symmetric -key
C:substitution
D: transposition
63 : _____ means that the data must arrive at the receiver exactly as they were sent
A: Nonrepudiation
B: Message integrity
C: Authentication
D : Secrecy
64 :The process of entering data into a storage location
A: adds to the contents of the location
B :cause variation in its address number
C :is known as a readout operation
D: is destructive of previous contents
E : None of the above
65: To prevent ____ , an operating system can put resource restrictions on processes
A : starvation
B : Synchronization
C : Paging
D : Deadlock
66 : The third generation of computers covers the period
A : 1971 - 1982
B:1982 -1994
C : 1959-1964
D: 1965-1971
E : 1995 - Now
67: if you want to change the value of an attribute of a tuple , you use the ___ operation A
. project
B. join
C: Update
D: Select
68 : A program that converts computer data into some code system other than the normal
one is known
A : Encoder
B : Simulation
C : Emulator
D : Coding
E : None of the above
69 : Tape is an example of storage device that can be accessed ______
A : sequentially
B : Randomly
C : Hash
D : No
70 : ______ is a protocol for file transfer
A : FTP
B :SMTP
C: TELNET
D: HTTP
1/ The _____ layer of the TCP/IP protocol suite transmits a bit steam over a physical
medium
A. Physical
B. Datalink
C. Transport
D. Network
2/ JPEG encoding involve ____, a process that reveals the redundancies in a block
A. Vectorization
B. Blocking
C. Quantization
D. The discrete cosine transform
3/ ______ can occur if a process has to many resource restriction
A. Deadlock
B. Synchronization
C. Paging
D. Starvation
4/ ______ cryptography is often for short messages.
A. Asymmetric-key
B. Secret-key
C. Symmetric-key
D. Open-key
5/ In_______, the identity of a party is verified once for the entire duration of system access.
A. Message authentication
B. Entity authentication
C. Message encryption
D. Message integrity
6/ In a computer, the ________ subsystem stores date and program.
A. Control unit
B. ALU
C. Input/output
D. Memory
7/ in the_______ graphic method of representing an image in a computer, re-scalling of the
image creates a ragged or grainy image.
A. Quantized
B. Vector
C. Bitmap
D. Binary
8/ To find the orientation of an object, we use:
A. Stereo vision
B. Segmentation
C. Texture
D. Motion
9/ The _______ construct tests a condition
A. Flow
B. Sequence
C. Decision
D. Repetition
10/ When a hashing algorithm produces an address for an insertion key and that ad-dress is
already occupied, it is called a___.
A. Linked list
B. Collision
C. Synonym
D. Probe
11/ Which number representation method is often used to store the exponential value of a
fractional part?
A. Ten’s complement
B. Excess
C. Unsigned integers
D. Two’s complement
12/ The_____ is a computer subsystem that performs operation on data.
A. Memory
B. Bus system
C. I/O hardward
D. CPU
13/ What is the domain name in the email address [email protected]?
A. Fpt.edu.vn
B. Edu
C. Longnq9
D. [email protected]
14/ When we want to store music in a computer, the audio signal must be___.
A. Smpled only
B. Coded only
C. Quantized only
D. Sampled, quantized, and coded
15/ IP addresses are currently_____ bits in length.
A. 4
B. 40
C. 32
D. 8
16/ Each column in a relation is called____.
A. An attribute
B. A union
C. A tuple
D. An attitude
17/ A binary operation os applied to ______ relations (s) and creates an output of ____
relation(s)
A. One, two
B. Two, two
C. Two, one
D. One, one
18/ The three steps in the running of a program on a computer are performed in the specific
order____.
A. Fetch, decode, and execute
B. Fetch, execute, and decode
C. Decode, fetch, and execute
D. Decode, execute, and fetch
19/ The push operation_____ of the stack.
A. Deletes an item from the bottom
B. Inserts an item at the bottom
C. Deletes an item from the top
D. inserts an item at the top
20/ The____ scheduler moves a process form one process state to another.
A. Vietual
B. Process
C. Queue
D. Job
21/ _____ is a protocol for email services.
A. SMTP
B. TELNET
C. FTP
D. HTTP
22/ The____ level of a three-level DBMS architecture defines the logical view of the data.
A. Internal
B. External
C. Conceptual
D. Physical
23/ When a sequential file is updated, the_____ file gets the actual update.
A. Transaction
B. Error report
C. Old master
D. New master
24/ To un-set (force to 0) all the bits of a bit pattern, make of all 0s and then____ the bit
pattern and the mask.
A. NOT
B. AND
C. XOR
D. OR
25/ Main memory in a computer usually consists of large amounts of____speed memory.
A. High
B. Low
C. Very high speed
D. Medium
26/ in JPEG encoding, the___ process breaks the original picture into smaller blocks and
assigns a value to each pixel in a block.
A. The discrete cosine transform (DCT)
B. Blocking
C. Vectorization
D. Quantization
27/ The____ layer of the TCP/IP protocol suite is responsible for source-to-destinnation
delivery of the entire message.
A. Datalink
B. Transport
C. Session
D. Network
28/ In the_____ hashing method, the key is divided by the file size, and the address is the
remainder plus 1.
A. Modulo division
B. Direct
C. Digit extraction
D. Division remainder
29/ When converting a decimal fraction to base b, we repeatedly___b.
A. Subtract form
B. Divide by
C. Add to
D. Multiply by
30/ Which of the following is considered an intellectual property?
A. a patent
B. A strade secret
C. A strademark
D. All of the above

34. An indexed consists of ____.


A. only a random data file
B. only a sequential data file
C. only an index
D. an index and random data file
35. If the memory address space is 16 MB and the word size is 8 bits, then ___ bits are
needed to access each word.
A. 24
B. 16
C. 32
D. 8
36. The home page in Facebook can be used
A. only for sign-up
B both for sign-up and log-in
C. only for log-in
D neither for sign-up nor log-in
37. The complexity of a problem is O (Iog10 n) and the computer executes 1 million
instructions per second. How long does it take to run the program if the number of
operations is 10,000?
A. 1 microsecond
B 3 microseconds
C. 2 microseconds
D 4 microseconds
38. If the exponent in Excess_127 is binary 10000101. the exponent in decimal is__
A.6
B.9
C.8
D.7
39. In a linked list, each element contains____
A. both data and link
B. only data
C. neither data or a link
D. only a link
40.________ between modules in a software system must be minimized.
A. Neither coupling nor cohesion
B. Coupling
C. Both coupling and cohesion
D. Cohesion
41. ______is a memory type with capacitors that need to be refreshed periodically.
A. ROM
B CROM
C. SRAM
D. DRAM

42. In postorder traversal of a binary tree, the left subtree is processed _____

A. second
B last
C. first
D after the right subtree
43. In ____ cryptography, the same key is used by the sender and the receiver. A.
symmetric-key
B. public-key
C. asymmetric-key
D. open-key
44. A control unit with five wires can define up to ____ operations.
A. 5
B. 25
C. 10
D. 32
45. If you need to delete an attribute in a relation, you can use the ___ operation.
A. join
B. intersection
C. project
D. union
46. ____ data compression method, the received data need not be an exact copy of the
original message.
A. Only in JPEG
B. Only in JPEG
C. Only in MP3
D. In MP3. JPEG, or MPEG
47. If the memory has 2^32 words, the address bus needs to have ____ wires.
A. 32
B. 16
C. 64
D. 8
48. The ____ is a pointer that identifies the next element in the linked list.
A. link
B array
C. data
D node
49. ______ is multi-programming without swapping.
A. Virtual memory
B Demand paging
C. Partitioning
D Queuing
50. ________ is an English-language-like representation of code.
A. An algorithm
B An UML diagram
C. A program
D Pseudocode
51. If A is the first data element input into a stack, followed by B, C, and D, then ____ is the
first element to be removed.
A. C
B. A
C. D
D. B
52. We use a _____ search for an ordered list.
A. sequential
B. binary
C. bubble
D. insertion
53. If we are adding two numbers, one of which has an exponent value of 7 and the other an
exponent value of 9, we need to shift the decimal point of the smaller number
A. two places to the left
B. one place to the right
C. two places to the right
D. one place to the left
54. ____ is a process in which an algorithm call itself
A. Iteration
B. Recursion
C. Searching
D. Insertion
55.______ operator (s) takes two inputs to produce one output.
A. Only OR
B. Only NOT
C. Only AND
D. AND, OR, or NOT
56. In the system development process, writing the program is part of the _____ phase
A. implementation
B design
C. analysis
D testing
57. In ____ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.
A. selection
B every
C. bubble
D insertion
58. ____ between modules in a software system must be maximized.
A. Both coupling and cohesion
B Cohesion
C. Coupling
D. Neither coupling nor cohesion
59. A company’s product or service is identified as a______
A. a trademark
B. a patent
C. a trade secret
D. copyright
60. ____ is a unit that can add two inputs.
A. A register
B An ALU
C. A control unit
D. A tape drive
61. In a computer, the _____ subsystem performs calculations and logical opera-tions.
A. control unit
B ALU
C. memory
D input/output
62. In ______ cryptography, everyone has access to everyone's public key.
A. private-key
B symmetric-key
C. asymmetric-key
D secret-key
63. The ____ is the theoretical counterpart of the CPU.
A. disk
B tape
C. read/write head
D controller
64. We use ____ to denote a program's complexity.
A. the Simple Language
B factorials
C. big-0 notation
D the Turing number
65. In language understanding, parsing a sentence is part of:
A. semantic analysis
B syntactic analysis
C. pragmatic analysis
D speech recognition
66. In ____ encoding, the more frequently occurring characters have shorter codes than the
less frequently occurring characters.
A. JPEG
B . LZ
C. Huffman
D Run-length

67. A (n) _______ list is also known as a queue


A. unordered
B. FIFO
C. LIFO
D. ordered
68. A right to a written or created work is referred to as
A. a patient
B. a trademark
C. copyright
D. a trade secret
69. A _______ is a storage device to which the user can write information only once
A. CD-RR
B. CD-RW
C. CD-ROM
D. CD-R
70. In preorder traversal of binary tree, the_____
A. left subtree is processed first
B. the root is never processed
C. right subtree is processed first
D. root is processed first
71. The smallest area on a magnetic disk that can be accessed at one time is a _____.
A. sector
B. head
C. frame
D. track
72. A register in a CPU can hold _____.
A. only instructions
B. only data
C. data, instructions, or program counter values
D. only program counter values
73. ______ are keys that hash to the same location in the data file
A. Collisions
B. Linked Lists
C. Synonyms
D. Buckets
74. Which of the following is not a sentence in a propositional logic:
A. Where is John?
B. True
C. Ford is a car
D. If John is home then Mary is at work
75. The main foundation thinking machine came from:
A. Gottfried W. Leibniz
B. John McCarthy
C. Sir Isaac Newton
D. Alan Turing
76. The precision of the fractional part of a number stored in computer is defined by the ____
A. last digit
B. mantissa
C. exponent
D. sign
77. An empty linked list consist of _______
A. a node
B. a null head pointer
C. two nodes
D. data and link
78. In the______graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. bitmap
B. binary
C. quantized
D. vector
79. The controller has _____ states
A. three
B. a finite number of
C. four
D. an infinite number of
80. The _____ statement repeats one or more actions
A. decrement
B. complement
C. loop
D. increment
81. ______ is a basic algorithm in which we want to find a location of a target in a list of
items.
A. Sorting
B. Product
C. Summation
D. Searching
82. A ____ shows, among other things, the movement of the head/write head, the character
read, and the character written.
A. diagram
B. transition table
C. Turing machine
D. flowchart
83. In the _____ method for synchronizing the operation of CPU with an I/O device, the CPU is
idle until the I/O operation is finished.
A. isolated I/O
B. interrupt-driven I/O
C. programmed I/O
D. DMA
84. In an abstract data type, ______.
A. the ADT implementation is hidden
B. the ADT implementation is known
C. Nothing is hidden
D. the ADT public operations are hidden
85. The _______ is the theoretical counterpart of the CPU
A. controller
B. tape
C. read/write head
D. disk
86. The term Artificial Intelligence (AI) was first coined by:
A. Richard H. Richen
B. Alan Turing
C. Steven Spielberg
D. John McCarthy
87. The _____ manager is responsible for archiving and backup
A. memory
B. process
C. file
D. device
88. The ethical principle that measures the consequences of an act is referred to as ____
A. moral rules
B. none of the above
C. social contract
D. utilization
89. ______ can provide authentication , integrity, and nonrepudiation for a message
A. Encryption/ decryption
B. Key-exchange
C. Compression
D. Digital Signature
90. A ______ is a pictorial representations of states and their relationship to each other
A. flowchart
B. transition table
C. transition diagram
D. Turing machine
91. A node in semantic network becomes _______
A. an edge in frames
B. an object in frames
C. a line in frames
D. a slot in frames
92. Which physical topology uses a hub or switch?
A. bus and ring
B. ring
C. bus
D. star
93. In two’s complement representation with a 4-bit allocation, we get _______ when we
add 1 to 7
A. -8
B. -7
C. 8
D. 1
94. In _______, the identity of a party is verified once for the entire duration of system
access
A. message encryption
B. message integrity
C. entity authentication
D. message authentication
1. When a hashing algorithm produces an address for an insertion key and that address is
already called ___
A.collision
B.probe
C. synonym
D. linked list

2. An indexed file consists of ___


A. only a sequential data file
B. only an index
C. only a random data file
D. an index and random data file
3. ____is an arithmetic operation.
A. The exclusive OR
B. B. The unary NOT
C. C. Subtraction
D. D. The binary AND

4. When a sequential file is updated, the___ file contains the changes to be applied. A.
new master
B. old master
C. transaction
D. error report

5. The push operation ____ of the stack.


A. deletes an item from the top
B. B. deletes an item from the bottom
C. C. inserts an item at the top
D. D. inserts an item at the bottom

6. In a linked list, each element contains____.


A. only data
B. B. only a link
C. C. neither data nor a link
D. D. data and a link

7. We use a bit pattern called a ___ to modify another bit pattern.


A. mask
B. B. carry
C. C. float
D. D. byte

8. In an Excess conversion, we ____ the number to be converted


A. add the bias number to
B. B. subtract the bias number from
C. C. multiply the bias number by
D. D. divide the bias the number by.

9. A program that converts computer data into some code system other than the normal
one is known as.
A. Encoder
B. Simulation
C. Emulator
D. Coding
E. None of the above

10. The ALU of a computer responds to the commands coming from


A. primary memory
B. control section
C. external memory
D. cache memory
E. None of the above

11. Conversion of binary number 1010101000010111 to hexadecimal number is


A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the above

12. We use a ___ search for an ordered list.


A. sequential
B. binary
C. bubble
D insertion

13. In an inorder traversal of a perfect binary tree, the root is processed____


A. first
B. second
C. last
D. two times

14. The most important advantage of a video disk is_______


A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the above

15. An array that consists of just rows and columns is a ___ array.
A. one-dimensional
B. two-dimensional
C. three-dimensional
D. multidimensional
16. The TCP/IP model has___ layers.
A. five
B. SiX
C. seven
D. eight

17. The precision of the fractional part of a number stored in a computer is defined by
the____
A. sign
B. exponent
C. mantissa
D. last digit
18. The ethical principle that dictates that a decision should be made according to the
universally accepted principles of morality is referred to as ____
A. moral rules
B. utilization
C. social contract
D. none of the above

19. ____means concealing the message by covering it with something else.


A. Cryptography
B. Steganography
C. Compressing
D Authentication

20. The ethical principle that measures the consequences of an act is referred to as___
A. moral rules
B. utilization
C. social contract
D. none of the above

21. Pascal is a(n)______________ language.


A. procedural
B. functional
C. declarative
D. object-oriented

22. In___________ traversal of a perfect binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postorder
D. any order

23. Which of the following can store information in the form of microscopic pits on metal
disks.
A. Laser disks
B. Tape cassettes
C. RAM cartridge
D. Punched cards
E. None of the above

24. The base of the binary number system is___


A.2
B. 8
C. 10
D. 16

25. Information about a product is that is kept secret by the owner is referred to as a__

A. trade mark
B. trade secret
C. patent
D. copyright

26. In__________ cryptography, everyone has access to everyone's public key.

A. symmetric-key
B. asymmetric key
C. secret-key
D. privale-key
27. The________ construct tests a condition.
A. sequence
B. decision
C. repetition
D. flow construct tests a condition.

28. In_______ traversal of a perfect binary tree, the left subtree is processed
second.

A. preorder
B. inorder
C. postorder
D. out of order traversal of a perfect binary tree, the left subtree is processed second.

29. Which is a unit representing the no bits of discrete.


A. Baud
B. Byte
C. Bit
D. All of the above
E. None of the above

30._________ operator (s), if the input is two 1s, the output is 0.


A. In only AND
B. In only OR
C. In only XOR
D. In AND, OR, or XOR

31.___________ between modules in a software system must be minimized.

A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion

32. ___________is the breaking up of a large project into smaller parts

A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization

33. Who is considered the 'father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kennoth H. Olsen
C. Seymour Cray
D. Basic Pascal E.
None of the above

34. A_________ controller is a high-speed serial interface that transfers data in packets.

A. SCSI
B. USB
C. FireWire
D. USB and FireWire controller is a high-speed serial interface that transfers data in
packets.

35. ___________operator (s) takes two inputs to produce one output.

A. Only AND
B. Only OR
C. Only XOR
D. AND, OR, or XOR

36. In_________cryptography, the same key is used in both directions.

A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key

37. The first electronic special-purpose computer was called_____


A. Pascal
B. Pascaline
C. ABC
D. ENIAC

38. In______sort, the item that goes into the sorted list is always the first item in the
unsorted list.
A.Selection
B. bubble
C. insertion
D. every

39. __________is a protocol for e mail services.


A. FTP
B. SMTP
C. TELNET
D. HTTP

40. C, C++, and Java can be classified as_______ lanquages

A. machine
B. symbolic
C. high-level
D. natural

41. ________is a measure of how tightly two modules are bound to each other.

A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
1.The_____deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
2.The format of an IPv4 address is referred to as______
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation

3.A register in a CPU can hold_____


A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values
4.The______ is a protocol that is used to define how the client-server programs can
be written pages from the Web.
A FIP
B. SMTP
C. TELNET
D. HTTP
5.A program becomes a_____ becomes a program again from the moment it
is selected for execution until it has finished
A.Program
B.Job
C.Process
D.Task
6.In_____ more than one program is in memory at the same time and they are
executed concur CPU switching rapidly between the programs
A. Monoprogramming
B. Multiprogramming
C.Microprogramming
D.Operating system
7.A billionth of a second is defined as a:
A. Millisecond
B. Microsecond
C.Nanosecond
D. Picoseconds
E. None of the others
8.Which is another name for functional language?
A. Machine
B. Application language
C. Low-level language
D. High-level language
E. None of the others
9.The role of the physical layer is to transfer the bits received from the data-link
layer and convert_______for transmission.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
10.There are several methods for handling address collisions and each of
them_______ of the hash
A. Independent
B. Dependent
C. Based on
D. Related
11._____is an ordered set of unambiguous steps that produces a result and
terminates in a finite time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
12.In a three-level DBMS architecture, the layer that interacts directly with the
hardware is the____level.
A. External
B. Conceptual
C. Internal
D. Physical
13.Which of the following is taking the one's complement of of the integer 00110110?
A. 11001100

B. 11001111
C. 11001001
D. 11100110
A
14.____uses the principle of logical reasoning to answer queries. It is based on
formal logic defined by Greek mathematicians and later developed into firstorder
predicale calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
15.In the data link layer, a Bluetooth LAN is a (an)____network
A. Wired WANs
B. Ad hoc
C. Dial-up service
D. Extended Service Set
16._______is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
Obsolescence
D. Modularization
17.The ability of a computer system to remain operational despite various failures is
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
18.Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
19.Defining the users, requirements, and methods is part of the
A. Analysis
B. Design
C. Implementation
D. Testing
phase.
20.In a____the project team needs to choose a language or a set of languages from
among the procedural languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
21.____can be threatened by security attacks
A. Confidentiality, cryptography, nonrepudiation
B. Confidentiality, encryption, decryption
C. Confidentiality, integrity, availability
D. Confidentiality, denial of service, masquerading
22.______protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
23.Static RAM (SRAM) technology uses____The gates hold their state 0 or 1
A. Ultraviolet light
B. Electronic impulses
C.Capacitors
D.Flip-flop gates
24.To search for elements. we can use____on sorted arravs that can help to
decrease time complexity
A Sequential search
B. Insertion Sort
C. Selection sort
D. Binary search
25.C language is a(n)_____ language
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
26.______is a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D.A tape drive
27.The number of bits per sample is sometimes referred to as the_____
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28.The maximum value of an octal integer with K=2 digits is Nmax =____
A. 63
B. 64
C. 65
D. 66
E. None of the others
29.A company's product or service is identified as a
A Trade mark
B. Trade secret
C. Patent
D.Copyright
30.Which of the following representations is erroneous?
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
30.What is method in black-box testing which tests are designed to include
representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
31.______is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest

32.A system program which helps the execution of user programs is known as

A. System software
B. Application program
C. Batch operating system
D. Utilities
E. None of the others

33.In the hierarchical database model, data is organized as an inverted

A. Graph
B. Tree
C. Array
D. Record

34.____can be measured by such metrics as mean time between failures number


of bugs per thousand lines of code and number of user requests for change.

A. Accuracy
B. Security
C. Efficiency
D. Correctability

35.In _________ sort, the smallest item moves to the beginning of the unsorted list.
There is no one-to-one swapping.
A Selection
B. Bubble
C. Insertion
D. Every
36._____ is an attack that reduce the capability of a computer system to
function correctly or bring the system down together by exhausting its
resources
A. DoS
B. Trojan horses
C. Worms
D. Viruses

37. Why OS is responsible for the efficient use of input/output devices?

A. Because need to maintains a queue for each input/output device

B. Because these devices are slower in speed compared with the CPU and
memory
C. It may use FIFO for one device
D. The manager also needs to know when a device has finished serving
one process

38. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100

39. The operation that takes two relations and combines them based on common
attributes is the operation.
A Join
B. Project
C. Union
D. Intersection

40. In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4

41. Which component is not an operating system component?


A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program

42. Which component is not an operating system component?


A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.____is the process by which a given set of relations are transformed to a new set of
relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
44. Each row in a relation is called
A. An attribute
B. A tuple
C. A union
D. An attitude

45. If the ASCII code for E is 1000101, then the ASCII code for e is consulting the
ASCII table.
A 1000110
B. 1000111
C. 0000110
D. 1100101

46.The push operation of the stack.


A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

47.We use the _____search for an ordered list.

A Sequential
B. Binary
C. Bubble
D. Insertion

48. An_____ is a sequence of operands and operators that reduces to a single value

A. Expression
B. Operator
C. Variables
D. Input/output

49. _____is a series of randomized letters and numbers which humans cannot make
any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

50. A____is a collection of related elements possibly of different types having a single
name

A. Array
B. Record
C. Linked list
D. Tree
51. In______cryptography, everyone has access to everyone's public key

A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52. In____,the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation

53. In a_____the relationship between a character in the plaintext to a character in the


ciphertext is one-to-many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher

54. Use a circular right shift operation on the bit pattern 1001 1000?
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000

55. Which type of computers use the 3 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others

56. A hashed file uses a


A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function to accomplish this mapping.

57. Who is considered the father of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others

58. In____, ledges are ordered pairs of vertices. If x and y are two vertices and an edge
e = (x, y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs

59. The attack that reduces the capability of a computer is called a ____attack

A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

60. How can we set name of nodes in a linked list?


A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
1. What is returnted from an output device when it retrieves the bit string 00101011
stored in the unsigned integer?
(Choose 1 answer)
A. -43
B. 53
C. 43
D. -53
2. In the atacks threaten the confidentiality of information________ refers to
unauthorized access of data
(Choose 1 answer)
A. Denial of service
B. Traffic analysis
C. Snooping
D. Repudiation
3. An index register that is automatically incremented or decremented with each use is
(Choose 1 answer)
A. None of the others
B. Assembler
C. Asynchronous
D. Auto index
E. Compiler
4. Inside the ADT are two different parts of the model that are_____and ______
(Choose 1 answer)
A. Application program and public operations
B. Data structure and application program
C. Application program and private operations
D. Data structures and operations
5. An Ipv4 address is a _____ address that uniquely and the universally defines the
connection of a host or a router to the Internet.
(Choose 1 answer)
A. 32-bit
B. None of others
C. 128-bit
D. 64-bit
6. A word can be______ bits.
(Choose 1 answer)
A. Only 32
B. Only 8
C. 8, or 16, or 32
D. Only 16
7. A step-by-step solution to a problem is called_________ .
(Choose 1 answer)
A. Hardware
B. An algorithm
C. An operating system
D. A computer languge
8. What is the analysis process in the system implementation phase that will use a
program as that manipulates passive object?
(Choose 1 answer)
A. Classical analysis
B. All of the others
C. Structured analysis
D. Procedure-oriented analysis
9. The smallest storage area on a magnetic disk that can be accessed at one time is
a______
(Choose 1 answer)
A. Sector
B. Head
C. Track
D. Frame
10. What is language of procedural paradigm that is high level language and also
has some low
(Choose 1 Answer)
A. Pascal
B. C
C. Ada
D. COBOL
11. In ______ more than one program is in memory at the same time anf they arre
executed concu.. CPU switching rapidly between the programs
(Choose 1 answer)
A. Operating system
B. Monoprograming
C. Multiprograming
D. Microprograming
12. All the members of a record must be________ .
(Choose 1 answer)
A. Character type
B. Related types
C. The same type
D. Integer type
13. We use our ______ when we first log into the system. This contains any files
we create while in contain personal system files.
(Choose 1 answer)
A. Home directory
B. Root directory
C. Working directory
D. Parent directory
14. _________ means that the sender and the receiver expect confidentiality
(Choose 1 answer)
A. Authentication
B. Integrity
C. Encryption and decryption
D. Nonrepudiation
15. _______ is a program that facilitates the execution of the other programs
(Choose 1 answer)
A. A queue
B. An operating systerm
C. An applicaton program
D. Hardware
16. ______ were designed in the 1950s to control mainframe computers.
(Choose 1 answer)
A. Time-sharing systems
B. Parallel systems
C. Batch operating system
D. Personal systems
17. ______ is the breaking up of a large project into smaller parts
(Choose 1 answer)
A. Obsolescence
B. Modularization
C. Incrementing
D. Coupling
18. Use a simple right shift operation on the bi pattern 1001 1000
A. 1001 1000
B. 1001 1001
C. 0100 1100
D. 0100 1101
19. We use our___when we first log into the system. This contains any files we
create while in contain personal system files.
A. Parents directory
B. Working directory
C. Home directory
D. Root directory
20. A(n)___is a suitable structure when a small number of insertions and deletions are
required searching and retrievalis needed
A. Array
B. Tree
C. Record
D. Linked list
21. Which technique is use in multiprogramming that needs to be determined size
beforehand than manager and with each program occupying a contiguous space
A. Paging
B. Partitioning
C. Demand segmentation
D. Demand paging
22. _____is an English language-like representation of code
A. A program
B. Pseudocode
C. An algorithm
D. A UML diagram
23. The______manager is responsible for archiving and backup
A. Memory
B. File.
C. Device
D. Process
24.
25. A__is a noactive set of instructions stored on disk (or page). It may not
become a
A.Task
B. Job
C. Program
D. Process
26. A number which is stored and processed but not in the standard expotential is
called________
A. Decimal number
B. Octal number
C. Fixed point number
D. None of the others
E. Floating point number
27. C++ and C# language is a(n)_______number
A. Functional
B. Object-oriented
C. Procedural
D. Declarative
28. In_______sort, the item that goes into the sorted list is always the first item in the
unsorted
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
29. A step-by-step solution to the problem is called______
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
30.
31. Each node in a graph can have___parents
A. At most two node
B. No node
C. Only one
D. One or more
32. The smallest storage area on a magnetic disk that can be accepted at one time is a
_____
A. Taks
B. Frame
C. Sector
D. Head
33. The ethical principle that discuss that an act is ethical when a majority of people in
society ar referred to as_____
A. Social contract
B. Ultilization
C. None of the others
D. Moral rules
34.
35. An instruction that transfers program control to one or more possible paths is known
as_____
A. None of the others
B. Application program
C. Ultility program
D. System solution
36. ___ refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17,2 it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Bit depth
B. Encoding
C. Quantization
D. Sampling rate
37. An empty linked list consists of_____.
A. Datas and a link
B. Two nodes
C. A node
D. A null head pointer

38.

39. Symbolic languages were developed in


A. 1950
B. 1962
C. 1980
D. None of the others
E. 1974
40.

41. The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Running
C. Functioning properly
D. Finished
42. The ______manager is responsible for archiving and backup.
A. Memory
B. File
C. Process
D. Device
43. _____is a step-by-step method for solving a problem or doing a task.
A. A construct
B. An algorithm
C. A recursion
D. An iteration
44. After a sequential file is updated, the ______file contains the most current data.
A. Transaction
B. Old master
C. New master
D. Error report
45. In the relational database model data is organized in________called relations.
A. None of others
B. Two-dimensional array
C. Two-dimensional tables
D. Two-dimensional record
46.
47. What is the name given to the molecular-scale computer?
A. None of the others
B. Femtocomputer
C. Nanocomputer
D. Microcomputer
E. Supercomputer
48.
49. An instruction that transfers program control to one or more possible paths is known as
A. Broadband channel
B. None of the others
C. Utility program
D. System software
E. Application program
50. _______is an English-language-like representation of code.
A. A program
B. Pseudocode
C. A UML diagram
D. An algorithm
51. The first electronic special-purpose computer was called_______.
A. ENIAC
B. Pascaline
C. ABC
D. Pascal
52. A transport-layer payload may be_____in several network-layer packets.
A. Encrypted
B. Decapsulated
C. Decrypted
D. Encapsulated

53. The enqueue operation___an item at the___ of the queue.


(Choose 1 answer)
A. Insert font
B. Insert rear
C. Delete end
D. Delete front
54. In the binary system, the base b = 2 and we use only two symbols to represent numbers.
The system are often referred to as binary digits or___?
(Choose 1 answer)
A. Byte
B. Bitmap
C. Digits
D. Bits
55. In physical layer, a ____ can be broadly defined as anything that can carry information
from destination.
(Choose an answer)
A. Digital to-analog
B. Transmission medium
C. Analog-to-digital conversion
D. Digital-to-digital conversion
E. Analog-to-analog conversion
56. Arithemetic left shift is used to____ an integer by two.
(Choose an answer)
A. Multiply
B. Subtraction
C. Additon
D. Divide
57. ___ is process in which an algorithm calls itself.
(Choose 1 answer)
A. Insetion
B. Iteration
C. Searching
D. Recursion
58. The binary equivalent of the Octal number 13.54 is
(Choose 1 answer)
A. All of the others
B. None of the others
C. 1001.1110
D. 1011.1011
E. 1101.1110
Another Final
1.What is the analysis process in the system implemetation phase that will use a program
that manipulates passive object?
(Choose 1 answer)
A. Procedure-oriented analysis
B. All of others
C. Structured analysis
D. Classical analysis
2. Inside the ADT are two different parts of the model that are ___ and ___
(Choose 1 answer)
A. Application program and private operations
B. Application program and public operations
C. Data structure and operations
D. Data structure and application program
3. A word can be ____ bits.
A. Only 8
B. Only 32
C. Only 16
D. 8, or 16, or 32
4. Defining the usersm requirements, and methods is part of the ____ phase.
A. Analysis
B. Implementation
C. Testing
D. Design
5. The intersection operation is also a binary operation taking two relations and creating a
new relations must have the same ____
A. Relation
B. Name
C. Attributes
D. Size
6. Symbolic languages were developed in
A. 1950
B. 1962
C. None of the others
D. 1980
E. 1974
7. In the graphic method of representing an image in a computer, each pixel is assigned
A. Quantized
B. Binary
C. Vector
D. Bitmap
8. In the attacks threaten the confidentiality of Information ___ refers to unauthorized access
the of data.
A. Traffic analysis
B. Repudiation
C. Snooping
D. Denial of service
10. ___ were designed in the 1950s to control mainframe computers.
A. Personal system
B. Time-sharing system
C. Batch operating system
D. Parrallel systems
11. ___ more than one program is in the memory at the same time and they are executed
concur CPU switching rapidly between the programs
A. Operating system
B. Mono programing
C. Multiprograming
D. Microprograming
12. Which physical tology uses a hub or switch?
A. Bus and ring
B. Ring
C. Bus
D. Star
13. Each row in a relation is called ___.
A. An attribute
B. An attitude
C. A tuple
D. A union
14. An index register that is automatically incremented or decremented with each use is
A. Assembler
B. Asynchoronous
C. Auto index
D. None of the others
E. Complier
16. The enqueue operation ___ an item at the ___ of the queue.
A. Inserts front
B. Delete end
C. Insert rear
D. Delete front
18. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1000
B. 1001 1001
C. 0100 1100
D. 0100 1101
19. We use our ___ when we first log into the system. This contains any files we create while in
contain personal system files.
A. Parent directory
B. Working directory
C. Home directory
D. Root directory
20. A(n) ___ is a suitable structure when a small number of insertions and deletions are
requires searching and retrieval is needed.
A. Array
B. Tree
C. Record
D. Linked list
21. Which technique is used in multiprograming that needs to be determined size
beforehand the manager and with each program occupying a contiguous space?
A. Paging
B. Partitioning
C. Demand segmentation
D. Demand paging
22. ___ is an English-language-like representation of code.
A. A program
B. Pseudocode
C. An algorithm
D. A UML diagram
23. The ___ manager is responsible for archiving and backup.
A. Memory
B. File
C. Device
D. Process
25. A___ is a nonactive set of instructions stored on disk (or tape). It may or may not
become a
A. Task
B. Job
C. Program
D. Process
26. A number which is stored and processed but not in the standard exponential form is
called
A. Decimal number
B. Octal number
C. Fixed point number
D. None of the others
E. Floating point number
27. C++ and C#language are a(n) ____ language.
A. Functional
B. Object-oriented
C. Procedural
D. Declarative
28. in short, the item that goes into the sorted list is always the first item in the unsorted.
A. Bubble
B. Insertion
C. Selection
D. Every
29. A step-by-step solution to a problem is called ____.
A. An algorithm
B. A computer language
C. An operating system
D. Hardware
31. Each node in a graph can have ___ parents.
A. At most two node
B. No node
C. Only one
D. One ore more
32. The smallest storage area on a magnetic disk that can be accessed at one time is a ___.
A. Track
B. Frame
C. Sector
D. Head
33. The ethical principle that dictates that an act is ethical when a majority of people in
society age referred to as ____.
A. Social contract
B. Ultilization
C. None of the others
D. Moral rules
35. An instruction that tranfers program control to one or more possible paths is known as
A. None of the others
B. Application
C. Broadland program
D. Utility program
E. System software
36. In physical layer, a ____ can be broadly defined as anything that can carry information
form destination.
A. Analog-to-analog conversion
B. Analog-to-digital conversion
C. Digital-to-digital conversion
D. Digital-to-analog conversion
E. Transmission medium
37. _____ is a step-by-step method for solving a problem or doing a task.
A. An itetation
B. A algorithm
C. A construct
D. A recursion
38. The parts of central processing unit (CPU)
A. ALU
B. Control unit
C. I/O devices
D. Registers
E. Optical device
F. Magnetic device
39. ____ refers to a process that rounds the value of a sample to the closest integer value.
For real value is 17.2, it can be rounded down to 17; if the values is 17.7, it can be rounded
up to
A. Sampling rate
B. Bit depth
C. Quantization
D. Encoding
40. We can convert a number in any system to decimal. We multiply each digit with its ___ in th
and add the result to get the number in the decimal system.
A. Numbers
B. Place value
C. None of others
D. Values
1. Convert the binary number (110.11)2 to decimal
A. 6.7
B. 7.75
C. 6.75
D. 27
2. Which of the following representations is erroneous?
A. (10111)2
B. (349)8
C. 3(AB)16
D. 256
3. In the ________ hashing method, selected digits are extracted from the key and used as
the address.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
4. If modules are written so that they can be reused in other systems then they have high
levels of _____
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
5. What is the order of Preorder traversal in Binary tree?
A. Right tree, Root tree, Left tree
B. Root tree, Right tree, Left tree
C. Left tree, Root tree, Right tree
D. Root tree, Left tree, Right tree
6. A register in a CPU can hold _____.
A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values
7. A one-bit signal that indicates the start of data transmission by an asynchronous device is
_______.
A. Parity bit
B. Status bit
C. Zero bit
D. Start bit
E. None of the others
8. The Stack operation returns an ____.
A. Full stack
B. Empty stack
C. Check status of stack
D. All of above
9. What is the method in black-box testing which tests are designed to representatives of
boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
10. Human beings are referred to as Homosapiens. Which device is called Silico sapiens?
A. Monitor
B. Hardware
C. Robot
D. Computer
E. None of the others
11. Which of the following is the expansion of EBCDIC?
A. Extended bit comparable to digital interface for computer
B. Extended bootable computerized digital infrared calculator
C. Extended binary coded decimal interchange code
D. Extended binary coded decimal information code
E. None of the others
12. In the hierarchical database model, data is organized as an inverted _____.
A. Graph
B. Tree
C. Array
D. Record
13. The _____ in the TCP/IP protocol suite is responsible for the host-to-host delivery of
messages
A. Physical
B. Data-link
C. Network
D. Transport
14. _____ is a very simple protocol using a minimum of overhead. If a process wants to send a
small message and does not care much about reliability.
A. TCP
B. UDP
C. IP
D. HTTP
15. The _____ of ethics says that we should avoid doing anything if it against universal
morality
A. Moral rules
B. Social contract
C. Utilization
D. Nonmaleficence
16. Information about a product is that is kept secret by the owner is referred to as a _____
A. Trademark
B. Trade secret
C. Patent
D. Copyright
17. In the modulo division hashing the reason for adding a 1 to the operation results is _____
A. That our list starts with 1 instead of 0
B. That the key starts from 1
C. That the prime number more than 1
D. All of others
18. _____ is a protocol for accessing and transferring documents on the WWW.
A. FTP
B. SMTP
C. TELNET
D. HTTP
19. Use a simple right shift operation on the bit pattern 1001 1000.
A.1001 1001
B. 1001 1000
C. 0100 1101
D.0100 1100
20. What is the result of difference database operation from 2 relation tables?
A. Neither the first relation nor the second.
B. Both of the first relation and the second.
C. The first relation but not the second.
D. The second but not the first.
21. The __ is the highest level in the file system hierarchy. This does not have a pRoot
directory
A. Home directory
B. Working directory
C. Parent directory
22. The dequeue operation ___ the item at the ___ of the queue
A.Delete front
B. Delete end
C. Inserts front
D. Insert rear
23. In paging, a program is divided into equally sized sections called_____.
A. Pages
B. Frames
C. Segments
D. Partitions
24. In the system development process, structure charts are tools used in the ____ phase.
A. Analysis
B. Design
C. Implementation
D. Testing
25. _____ results in a specification document that shows what the software what the
software will do without specifying how it will be done.
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
26. An _____ is a language-specific tokens that requires an action to be taken such as
arithmetic and rational
A. Expression
B. Operator
C. Variables
D. Input/output
27. What is a program of UNIX that accepts requests from users (processes) and interprets
them for the rest of the operating system?
A. Software
B. Function
C. SHELL
D. Feature
28. What is the result of one’s complement B ?
A. NOT B
B. Add B with 1
C. XOR B with 0
D. AND B with 0
E. OR B with 1
29. ______ means concealing the contents of a message by enciphering.
A. Steganography
B. Cryptography
C. Compressing
D. Authentication
30. _____ is required to allow any relation in the database to be represented, to allow a
query language
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
31. A program that is employed in the development, repair or enhancement of other
programs is known as
A. System software
B. Software tool
C. Applications program
D. Utility program
E. None of the others
32. Each element in record is called ____
A. A variable
B. An index
C. A field
D. A node
33. A technique used by codes to convert analog signal into a digital bit stream is known as
A. Pulse code modulation
B. Pulse Stretcher
C. Query processing
D. Queue management
E. None of the above
34. The device manager maintains one of more ____ for similar input/output devices
A. Graph
B. Array
C. Stack
D. Queue
35. _______ is usually privately owned, limited in size and connects some hosts in a single
office, building, or campus.
A. LAN
B. WAN
C. Internet
D. Network
36.Which of the following attacks is threatening integrity ?
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis
37.In a three level DBMS architecture, the layer that interacts directly with the hardware is
the _____level.
A. External
B. Conceptual
C. Internal
D. Physical.
38.Which is another name for functional language?
A. Machine
B. Application language
C. Low-level language
D. High-level language
E None of the others
39.Use an arithmetic right shift operation on the bit pattern 1001 1000.
A 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
40.____is a basic algorithm that adds a list of numbers
A. Summation
B. Product
C. Smallest
D. Largest
4 1.FORTRAN is a(n)____ language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented.
42.Which component is not an operating system component?
A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.Where have the program and data to be located before the ALU and control unit of a
computer can operate on it?
A. Internal memory
B. Secondary memory
C. Microprocessor
D. Magnetic tapes
E. None of the others
44.Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
45.In a____ a character (or a symbol) in the plaintext is always changed to the same
character (or symbol) in the ciphertext regardless of its position in the text
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
46.Which of the following is equivalent to 24 in decimal?
A. (11000)2
B. (1A)16
C. (31)8
D. None of the above
47.The___image encoding method, but it does not store the bit patterns for each pixel.
A. Bitmap
B. Quantized
C Vector graphic
D. Binary
48.An operating system is:
A. An interface between the hardware of a computer and the user
B. A program (or a set of programs) that facilitates the execution of other programs.
C. A general manager supervising the activity of each component in the computer system D.
Convert multimedia into binary
E. Operation on data
49.The ____layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a
frame between two adjacent nodes.
A. Transport
B. Network
C. Data-link
D. Session
50.In____edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x,
y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
51.Conversion of binary number 1010101000010111 to hexadecimal number is?
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
52.A multiprogramming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D Use many operating systems
E. None of the others
53.____is an ordered set of unambiguous steps that produces a result and terminates in a
finite time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm light.
……..can be programmed by the user. but can also be erased with a special device that
applies ultraviolet
A ROM
B. EEPROM
C. PROM
D. EPROM
54.According to the von Neumann model,_______ are stored in memory.
A. Only data
B. Only programs
C. Data and programs
D. Neither data nor programs
55.A number which is stored and processed but not in the standard exponential form is
called
A. Floating point number
B. Fixed point number
C. Octal number
D. Decimal number
E. None of the others
56.A process in the ready state goes to the running state when _____.
A. It enters memory
B. It requests I/O
C. It gets access to the CPU
D. It finishes running
57.Before insertion into a linked list we first apply the searching algoritm because we DO
NOT_____
A. Allow insertion into an empty list
B. Allow insertion in the middle of the list
C. Allow insertion at the beginning of the list
D. Allow data with duplicate values
58.When was Apple Macintosh II microcomputer introduced in the market?
A. 1964
B. 1970
C. 1986
D. 1987
E. None of the others
59. What is method in the object-oriented paradigm means that we can define several
operations with the same name that can do different things in related classes?
A. Method
B. Inheritance
C. Polymorphism
D. Classes
60.The no of logical records in a physical record is
A. Group
B. Blocking factor
C. Sector
D. Field
E. None of the others
61.A data structure can be _____.
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
62.The RSA algorithm for confidentiality uses_____crytography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition
63.In a DBMS__are those humans who can access the database directly to get information.
A. Database administrators
B. Normal users
C. Application programs
D. End users
64.One phase in system development is______
A. Analysis
B. Application
C. Designing
D. Collecting
65.The TCP/IP model has____layers.
A. Five
B. Six
C. Seven
D. Eight
66.We use the____search for ordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
67.In____sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every
68.___ who exploit the internet systems only to make public certain vast datasets of
information that would be
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
69.The binary equivalent of the Octal number 13,54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
70.In the ____method for synchronizing the operation of the CPU with an I/O device, the
CPU is idle until the I/O operation is finished.
A. Programmed I/O
B. Interrupt-driven I/O
C. DMA
D. Isolated I/O

File 2 (file cap):


7. Use a simple left shift operation of the bit pattern 1 0001 1000
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001
8. Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of others
9. The _____ (of current directory) is the directory we are ‘in’ at any point in a user session.
A. Root directory
B. Home directory
C. Working directory
D. Parent directory
10. _____ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
11. Each node in a graph can have _____ parents.
A. Only one
B. No node
C. One or more
D. At most two node
12. _____ separated the programming task from computer operations tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
13. In the relational database model is organized in _____ called relations.
A. Two-dimensional array
B. Two-dimensional tables
C. Two-dimensional record
D. None of others
14. Which of following represents a set of data items that share a specific relationship?
A. ADT
B. Data structure
C. Programming language
D. Data element
15. The most important advantage of a video disk is _____.
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
16. Which is a unit representing the no bits of discrete.
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others
17. A ____ is a collection of related elements possibly of different types having a single
name.
A. Array
B. Record
C. Linked list
D. Tree
18. In CISC (complex instruction set compute), an instruction in machine language is not
executed by the CPU-the CPU performs only simple operations, that is called _____.
A. Micro operation
B. Micro memory
C. Micro computer
D. Micro programming
19. The code that should be adequate for present and anticipated data processing both for
machine use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others
20. A transport-layer payload may be _____ in several network-layer packets.
A. Encapsulated
B. Decapsulated
C. Encrypted
D. Decrypted
21. In the internet today, Backbones and provider networks are also called _____.
A. Customer networks
B. Provider networks
C. Peering points
D. Internet service providers (ISPs)
22. Any device that performs signal conversion is
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
23. Which of the following is not currently a topic in computer science?
A. Speech recognition
B. Artificial intelligence
C. Thermodynamics
D. Multiprocessing
E. None of the others
25. What is a model process of software development where requirements are divided into
multiple modules of the software development cycle?
A. Waterfall model
B. Incremental model
C. Development process
D. Software engineering
26. Which of the following is considered an intellectual property?
A. A trademark
B. A trade secret
C. A patent
D. All of the others
27. In a three level DBMS architecture, the ______ level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical
28. In the sign-and-magnitude representation, the memory location can hold four bits,
assume that we have stored integer-6 in a memory location and we then try to subtract 7
to the integer. The computer’s response is _____? 1.110 và 0.111 => s=1, M= 101
A. 6
B. -6
C. 7
D. -7
29. What kind of testing uses the structure of the software is required to guarantee that all
the decision constructs ( two-way and multiway) are tested on each branch?
A. Testing phase
B. White-box testing
C. Black-box testing
D. Boundary testing
30. In the storing images, what is the technique use to encode a pixel ?
A. True-color
B. Index-color
C. Color depth
D. Bit map
31. How many symbols can be represented by a bit pattern with ten bits ?
A. 128
B. 256
C. 512
D. 1024
32. At the transport layer, addresses are called_____ , and these define the application-layer
programs at the source and destination.
A. TCP
B. Port numbers
C. UDP
D. IP address

33.
A/an _______ is a program in a procedural language that is a set of statements. The
statements are normally executed one after another. However, sometimes it’s necessary to
change this sequential order. This figure illustrates for this statement.
A. Assignment statement
B. compound statement
C. None of others
D. Control statement
34. In______, the program can be divided into differently sized section
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
35. What is quality referring to the ability to move software from one hardware platform to
another
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
36. C, C++, and Java can be classified as ______ languages.
A. Machine
B. Symbolic
C. High-level
D. Natural
37. In a block cipher a _____ is used to encrypt the whole even if the key is made of multiple
values
A. Key block
B. Single key
C. Key stream
D. Auto key
38. In _______ traversal of a binary tree, the right subtree is processed last.
A. Preorder
B. Inorder
C. Postorder
D. Any order
39. In _______cryptography, the same key is used by the sender and the receiver.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Open-key
40. Which of following that describe to the secure, information needs to be hidden from
unauthorized access ?
A. Confidentiality
B. integrity
C. Availability
D. Masquerading
41. The operation that takes two relations and combines them based on common attributes is
the _____ operation.
A. Join
B. Project
C. Union
D. Intersection
43.____ can be programmed by the user. but can also be erased with a special device that
applies ultraviolet light.
A. ROM
B. EEPROM
C. PROM
D. EPROM
44.____these are the "bad guys". They are the types of hackers who break into computer
networks with purely negative motives such as monetary gain or reputation
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
45.Which access method is used for obtaining a record from a cassette tape
A. Direct
B. Sequential
C. Random
D. All of the others
E None of the others
46.We can convert a number in any system to decimal. We multiply each digit with its____ in
the source and add the result to get the number in the decimal system. A. Numbers
B. Values
C. Place value
D. None of others
47.In____ cryptography, everyone has access to everyone's public key.
A Symmetric-key
B. Asymmetric-key
C Secret-key
D. Private-key
48.____file can be accessed sequentially.
A A sequential
B. An indexed
C. A hashed
D. No
49.The____manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
50.Use a simple right shift operation on the bit pattern 1001 1000.
A 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
51.Adding numbers in two's complement is____
A. Like adding the numbers in decimal
B. Logic operations
C. Shift operations
D. Arithmetic shift operations
52.What happens if the size of memory is less than the size of the program in a
monoprogramming OS?
A Need to use virtual memory
B. No overflow
C. Overflow
D. The program cannot be run
53.____refers to a process that rounds the value of a sample to the closest integer value. For
example, if the real value is 17.2, it can be rounded down to 17; if the value is 17.7, it can be
rounded up to 18.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
54.IfA is the first data element input into a stack, followed by B, C, and D, then____is the first
element to be removed
A. A
B. B
C. C
D. D
55.Which of the following is the user programmed semiconductor memory?
A SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
56.In____ sort, the item that goes into the sorted list is always the first item in the unsorted
list.
A Selection
B. Bubble
C. Insertion
D. Every
57.The devices in Bluetooth LAN, SOmetimes called gadgets, find each other and make a
network called____
A. ESS
B. Ad hoc
C. BSS
D. A piconet
58.The ethical principle that dictates that an act is ethical when a majority of people in
society agrees with it is referred to as____
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
59.The ____ is a protocol that is used to define how the client-server programs can be
written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
60.There are____ basic constructs in computer -science.
A One
B. Two
C. Three
D. Four
61.A database management system (DBMS) is a combination of components
A. 2
B. 3
C. 4
D. 5
62.The____is a computer subsystem that performs operations on data.
A. CPU
B. Memory
C. I/O hardware
D. Bus subsystem
63.When a sequential file is updated, the _____file gets the actual update.
A. New master
B. Old master
C. Transaction
D. Error report
64.Java is a(n)______language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
65.The base of the decimal number system is_____
A. 2
B. 8
C. 10
D. 16
66.____is an English-language-like representation of code
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
67.In physical layer, a____, can have only a limited number of defined values.Although each
number, it is often as simple as 1 and 0.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
68.The binary equivalent of the Octal number 13.54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
69.We use a______search for an unordered list
A. Sequential
B. Binary
C. Bubble
D. Insertion
70.In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 20 in hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
71.How many bits that we can find in the decimal number 20 in binary system?
A. 4
B. 5
C. 6
D. 7
72.A___is a nonactive set of instructions stored on disk (or tape).It may or may not become a
job
A. Program
B. Job
C. Process
D. Task
73.Given a linked list called children, the pointer variable children identifies____element of
the linked list
A. The first
B. The second
C. The last
D. Any
74.Each row in a relation is called_____
A. An attribute
B. A tuple
C. A union
D. An attitude

75.The organization and interconnection of the various components of a computer system is

A. Architecture
B. Networks
C. Graphics
D. Designing
E. None of the others
76.The queue operation:”queue (queueName)” is used to____
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
77.The device manager will be tracking every device constantly to ensure that the device is
______
A. Ready
B. Finished
C. Functioning properly
D. Running
To search for elements, we can use____on sorted arrays that can help to decrease time
co…..
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search

What is the number of bit patterns provided by a 7-bit code?


A. 256
B. 128
C. 64
D. 512
E. None of the others
How many connections (in the data bus) do we need to transfer 4 bytes of a word at the
sam…

A. 4
B. 8
C. 16
D. 32

The____is a pointer that identifies the next element in the linked list.
A. Link
B. Node
C. Array
D. Data

____were designed in the 1950s to control mainframe computers.


A. Time-sharing systems
B. Batch operating system
C. Personal systems
D. Parallel systems

In the_____a program is considered a mathematical function. In this context a function is


a…maps a list of inputs to a list of outputs.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

16. What is a program of UNIX that accepts requests from users (processes) and interprets
them the operating system?
A Software
B. Function
C. SHELL
D. Feature

17. The pop operation ........of the stack.

A. Deletes an item from the top


B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

18.The ASCII code for the character J is:


A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
A. None of the others

19.In. ......... a the project team needs to choose a language or a set of languages from
among the languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

20.......... is an English-language-like representation of an algorithm. There is no standard for


it- a lot of detail
A Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram

21. Which of the following attacks is threatening integrity?


A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding

22. The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALU
C. Control unit
D. Store location
E. None of the others

23. A process in the ...........state can go to either the ready, terminated, or waiting states.
A. Hold
B. Virtual
C. Running
D. Hold or running

24............ cryptography is often used for short messages.


A Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Open-key

25. We can convert a number in any system to decimal. We multiply each digit with its. ..... in
the and add the result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others

26. In the storing audio, if the signal is changing rapidly, we need more samples. It has been
sho ......... 40000 samples per second is good enough to reproduce an audio signal.
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth

27. The ....... deals with active objects instead of passive objects
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

28. Most important advantage of an IC is its

A Easy replacement in case of circuit failure


B. Extremely high reliability
C. Reduced cost
D. Low power consumption
E. None of the others

29. Instructions and memory addresses are represented by


A Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

30. The ...... manager is responsible for archiving and backup.


A. Memory
B. Process
C. Device
D. File

31. In the asymmetric-key method used for confidentiality, which key(s) is ( are ) publicly
known ?
A. Encryption Key only
B. Decryption Key only
C. Both Encryption and Decryption keys
D. Neither encryption key nor decryption key
E.
35. What is a program of UNIX that accepts requests from users (processes) and interprets
the operating system?
A. Software
B. Function
C. SHELL
D. Feature

36. The layer of the TCP/IP protocol suite provides services for end users.
A. Data-link.
B. Transport
C. Application
D. Physical

37. In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly
known?
A. Encryption key only
B. Decryption key only
C. Both encryption and decryption keys
D. Neither encryption key nor decryption key

38. The term users in a DBMS has a broad meaning. We can divide users
into:A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrator

39. The queue operation: "queue (queueName)" is used to


A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue

40. One phase in system development is


A. Analysis
B. Application
C. Designing
D. Collecting

41. Each element in a record is called .


A variable
B. An index
C. A field
D. A node

42. file can be accessed


sequentially.
A sequential
B. An indexed
C. A hashed
D. No

43. The unary operation always results in a relation that has exactly one more
rowthan relation
A. Insert
B. Delete
C. Update
D. Select
No. CHAPTER 1-20
1 The _______ model is the basis for today's computers.
a. Leibnitz b. von Neumann c. Pascal d. Charles Babbage
2 In a computer, the _______ subsystem stores data and programs.
a. ALU b. input/output c. memory d. control unit
3 In a computer, the _______ subsystem performs calculations and logical operations.
a. ALU b. input/output c. memory d. control unit
4 In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a. ALU b. input/output c. memory d. control unit
5 In a computer, the _______ subsystem serves as a manager of the other subsystems.
a. ALU b. input/output c. memory d. control unit
6 According to the von Neumann model, _______ are stored in memory.
a. only data b. only programs c. data and programs d. neither data nor
programs
7 A step-by-step solution to a problem is called _______.
a. hardware b. an operating system c. a computer language d. an
algorithm
8 FORTRAN and COBOL are examples of _______.
a. hardware b. operating systems c. computer languages d. algorithms
9 A 17th-century computing machine that could perform addition and subtraction was the
_______.
a. Pascaline b. Jacquard loom c. Analytical Engine d. Babbage
machine
10 _______ is a set of instructions in a computer language that tells the computer what to do
with data.
a. An operating system b. An algorithm c. A data processor d. A
program
11 _______ is the design and writing of a program in structured form.
a. Software engineering b. Hardware engineering
c. Algorithm development d. Instructional architecture
12 The first electronic special-purpose computer was called _______.
a. Pascal b. Pascaline c. ABC d. ENIAC
13 One of the first computers based on the von Neumann model was called _______.
a. Pascal b. Pascaline c. ABC d. EDVAC
14 The first computing machine to use the idea of storage and programming was called
_______.
a. the Madeline b. EDVAC c. the Babbage machine d. the Jacquard
loom
15 _______ separated the programming task from computer operation tasks.
a. Algorithms b. Data processors
c. High-level programming languages d. Operating systems
16 The base of the decimal number system is ____.
a. 2 b. 8 c. 10 d. 16
17 The base of the binary number system is ____.
a. 2 b. 8 c. 10 d. 16
18 The base of the octal number system is ____.
a. 2 b. 8 c. 10 d. 16
19 The base of the hexadecimal number system is ____.
a. 2 b. 8 c. 10 d. 16
20 When converting a decimal integer to base b, we repeatedly _____ b.
a. divide by b. multiply by c. add to d. subtract from
21 When converting a decimal fraction to base b, we repeatedly ____b.
a. divide by b. multiply by c. add to d. subtract from
22 Which of the following representations is erroneous?
a. (10111)2 b. (349)8 c. (3AB)16 d. 256
23 Which of the following representations is erroneous?
a. (10211)2 b. (342)8 c. (EEE)16 d. 145
24 Which of the following representations is erroneous?
a. (111)2 b. (346)8 c. (EEG)16 d. 221
25 Which of the following representations is erroneous?
a. (110)2 b. (141)8 c. (EF)16 d. 22A
26 Which of the following is equivalent to 12 in decimal?
a. (1110)2 b. (C)16 c. (15)8 d. None of the above
27 Which of the following is equivalent to 24 in decimal?
a. (11000)2 b. (1A)16 c. (31)8 d. None of the above
28 A data structure can be _______.
a. only an array b. only a record
c. only a linked list d. an array, a record, or a linked list
29 An array that consists of just rows and columns is a _______ array.
a. one-dimensional b. two-dimensional
c. three-dimensional d. multidimensional
30 Each element in a record is called _______.
a. a variable b. an index c. a field d. a node
31 All the members of a record must be ______.
a. the same type b. related types c. integer type d. character type
32 _____ is an ordered collection of data in which each element contains the location of the
next element.
a. An array b. A record c. A linked list d. A file
33 In a linked list, each element contains _______.
a. only data b. only a link c. neither data nor a link d. data and a link
34 The _______ is a pointer that identifies the next element in the linked list.
a. link b. node c. array d. data
35 Given a linked list called children, the pointer variable children identifies ________ element
of the linked list.
a. the first b. the second c. the last d. any
36 An empty linked list consists of _______.
a. a node b. two nodes c. data and a link d. a null head pointer
37 To traverse a list, you need a _______ pointer.
a. null b. walking c. beginning d. insertion
38 _______ is a sequenced collection of elements, of the same data type. We can use indexes
to refer to the element of an array.
a. record b. an array c. linked list d. retrieval
39 _______ is a collection of related elements, possibly of different types, having a single-
name.
a. array b. linked list c. record d. field
40 ________ uses a collection of related variables that can be accessed individually or as a
whole and it represents a set of data items that share a specific relationship.
a. ADT b. Database c. SQL d. Data structure
41 How many are common operations there on array?
a. 3 b. 2 c. 5 d. 8
42 _______ defines a combination of elements, while ______ defines the identifiable parts of
an element.
a. An array/a record b. Record/ Linked list c. An array/Linked list d. List/
tuple
43 ________ is package that defines a new data type, defines operations on that data type,
and encapsulates the data and the operations.
a. ADT b. Database c. SQL d. Data structure
44 _______ is a restricted linear list in which all additions and deletions are made at one end,
called the top.
a. Queue b. Stack c. Binary tree d. ADT
45 A (n) ________ list is also known as a queue.
a. LIFO b. FIFO c. insert d. pop
46 If A is the first data element input into a stack, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
47 If A is the first data element input into a queue, followed by B, C, and D, then ________ is
the first element to be removed.
a. A b. B c. C d. D
48 We defined four basic operations on a queue
a. stack, push, pop, empty b. list, insert, delete, traverse, empty
c. queue, enqueue, dequeue, empty d. depth first, breadth first
49 The pop operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
50 The push operation ________ of the stack.
a. Inserts an item at the top b. creates an empty stack
c. Checks the status of stack d. Deletes an item at the top
51 ______ is a tree in which no node can have more than two subtrees. In other words, a node
can have zero, one, or two subtrees.
a. Queue b. Stack c. Binary tree d. ADT
52 How many are most common operations defined for a binary tree?
a. 9 b. 7 c. 6 d. 5
53 In _______ the left subtree is processed first, then the root node and finally the right
subtree.
a. post-order traversal b. in-order traversal c. pre-order traversal d.
None of the above
54 In post-order traversal of a binary tree, the left subtree is processed________
a. First b. Second c. Third d. last
55 In preorder traversal of a binary tree, the ______is processed first, followed by the left
subtree
a. the right subtree b. root node c. Binary tree d. left subtree
56 _________ is a binary tree with one extra property: the key value of each node is greater
than the key values of nodes in each left subtree and smaller than the value of all nodes in
each right subtree
a. Queue b. Stack c. BST d. BTT
57 When a sequential file is updated, the ________ file gets the actual update.
a. New master b. Old master c. the transaction d. the error
report
58 When a sequential file is updated, the ________ file contains a list of all errors occurring
during the update process.
a. New master b. Old master c. the transaction d. the error
report
59 When a sequential file is updated, the ________ file contains the changes to be applied.
a. New master b. Old master c. the transaction d. the error
report
60 If the transaction file key is 20 and the first master file key is 25, then we ________ .
a. add the new record to the new master file b. delete the data
61 If the transaction file key is 20 with a delete code and the master file key is 20, then we
________ .
a. add the new record to the new master file b. delete the data
62 All the members of a record must be _______.

a. The same type b. The integer type c. the related types d. the
character type
63 The _______ level of a three-level DBMS architecture defines the logical view of the data
a. physical b. external c. internal d.
conceptual
64 In the system development process, structure charts are tools used in the _______ phase.
a. analysis b. implementation c. design d.
testing
65 In _______, the program can be divided into equally sized sections called pages, but the
pages need not be in memory at the same time for execution
a. demand paging b. paging c. demand segmentation
d. partitioning
66 In a three-level DBMS architecture, the _______ level determines where data is actually
stored on the storage devices.
a. physical b. external c. internal d.
conceptual
67 In the system development process, writing the program is part of the _______ phase.

a. analysis b. implementation c. design d.


testing
68 A process in the _______ state can go to either the ready, terminated, or waiting states
a. Hold or running b. Virtual c. hold d.
running
69 In paging, a program is divided into equally sized sections called _______.

a. partitions b. pages c. frames d.


segments
70 The data model and the schema of a DBMS are often defined at the _______ level.

a. physical b. external c. internal d.


conceptual
71 _______ is a multi-programming method in which multiple programs are entirely in memory
with each program occupying a contiguous space

a. demand paging b. paging c. demand segmentation d.


partitioning
72 In a three-level DBMS architecture, the layer that interacts directly with the hardware is the
_______ level.

a. physical b. external c. internal d.


conceptual
73 In a three-level DBMS architecture, the _______ level interacts directly with the users.

a. physical b. external c. internal d.


conceptual
74 In _______, the program can be divided into differently sized sections.

a. demand paging b. paging c. demand segmentation d.


partitioning
75 Testing a software system can involve _______ testing.

a. both black-box and glass box b. glass box c. black box d. neither black
box nor glass box
76 Defining the users, requirements, and methods is part of the _______ phase

a. analysis b. implementation c. design d.


testing
77 In an abstract data type, _______.

a. The ADT implementation is known b. The ADT public operations are


hidden
c. The ADT implementation is hidden d. Nothing is hidden
78 One phase in system development is _______.

a. Collecting b. Application c. designing d.


analysis
79 A process in the ready state goes to the running state when _______.
a. it requests I/O b. it enters memory c. it gets access to the CPU d.
it finishes running
80 IP addresses are currently _______ bits in length.

a. 4 b. 8 c. 40 d. 32
81 The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.

a. data link b. network c. transport d.


physical
82 The TCP/IP model has _______ layers.

a. five b. seven c. six d.


eight
83 The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation.

a. sign-and-magnitude b. unsigned c. two’s complement d.


one’s complement
84 In the _______ graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures

a. binary b. quantized c. vector d.


bitmap
85 The precision of the fractional part of a number stored in a computer is defined by the
_______.
a. sign b. exponent c. last digit d.
mantissa
86 A 32-bit code called _______ represents symbols in all languages.

a. ANSI b. Unicode c. Extended ASCII d.


EBCDIC
87 If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the
question without consulting the ASCII table

a. 0000110 b. 1000110 c. 1100101 d.


1000110
88 In the _______ graphic method of representing an image in a computer, each pixel is
assigned a bit patterns

a. binary b. bitmap c. vector d.


quantized
89 _______ is a set of instructions in a computer language that tells the computer what to do
with data

a. A program b. A data processor c. an operating system d. an


algorithm
90 Which number representation method is often used to store the exponential value of a
fractional part?

a. unsigned integer b. Two’s complement c. ten’s complement d.


Excess
91 Which number representation method is often used to store the exponential value of a
fractional part?

a. track b. head c. sector d.


frame
92 The ________ method of integer representation is the most common
method for storing integers in computer memory.

a. one’s complement b. two’s complement c. sign-and-magnitude d.


mantissa
93 In two's complement addition, if there is a final carry after the left most
column addition, ________

a. discard it b. plus a number c. subtract a number d.


multiply a number
94 For an 8-bit allocation, the smallest decimal number that can be represented in two's
complement form is ________

a. 127 b. 128 c. -128 d. -


127
95 For an 8-bit allocation, the largest decimal number that can be represented in two's
complement form is ________

a. 256 b. 128 c. 512 d. 127


96 When a fractional part is normalized, the computer stores the ________

a. only sign b. sign, exponent, mantissa c. only exponent d.


only mantissa
97 The unary ________ operator inverts its single input.

a. NOT b. AND c. XOR d. OR


98 ________ operator (s), if the input is two 0s, the output is 0.

a. only AND b. NOT c. only XOR d. AND,


OR, XOR
99 ________ operator (s), if the input is two 1s, the output is 0.

a. only AND b. NOT c. only XOR d. AND,


OR, XOR
100 For the binary AND operation, only an input of ________ gives an output of 1
a. two 0s b. two 1s c. one 1s and one 0s d.
None of the above
101 For the binary OR operation, only an input of ________ gives an output of 0.

a. two 0s b. two 1s c. one 1s and one 0s d.


None of the above
102 We use a bit pattern called a ________ to modify another bit pattern

a. track b. frame c. sector d.


mask
103 The ________ is a computer subsystem that performs operations on data.

a. register b. CPU c. control unit d. ALU


104 ________ is a stand-alone storage location that holds data temporarily.

a. register b. CPU c. control unit d. ALU


105 _______ is a unit that can add two input

a. register b. CPU c. control unit d. ALU


106 A control unit with five wires can define up to ________ operations.

a. 64 b. 256 c. 32 d. 8
107 If the memory address space is 16 MB and the word size is 8 bits, then________ bits are
needed to access each word

a. 24 b. 16 c. 8 d. 32
108 The data in ________ is erased if the computer is powered down.

a. RAM b. hardware c. software d.


None of the above
109 ________ is a memory type with capacitors that need to be refreshed periodically.

a. SRAM b. ROM c. DRAM d.


EPROM
110 ________ is a memory type with traditional flip-flop gates to hold data.

a. DRAM b. SRAM c. ROM d.


EEPROM
111 There are ________ bytes in 16 Terabytes.

a. 24 b. 23 c. 28 d. 216
112 ________ is a type of memory in which the user, not the manufacturer, stores programs
that cannot be overwritten.
a. PROM b. DRAM c. SRAM d.
EPROM
113 The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of
a frame between two adjacent nodes
a. data link b. network c. transport d.
physical
114 The ________ layer of the TCP/IP protocol suite is responsible for source-to-destination
delivery of the entire message

a. data link b. network c. transport d.


physical
115 In the ________ method for synchronizing the operation of the CPU with an I/O device, a
large block of data can be passed from an I/O device to memory directly

a. Interrupt-driven I/O b. Program I/O c. DMA d. I/O


module
116 In the ________ method for synchronizing the operation of the CPU with an I/O device, the
CPU is idle until the I/O operation is finished.

a. Interrupt-driven I/O b. Program I/O c. DMA d. I/O


module
117 The three steps in the running of a program on a computer are performed in the specific
order ________ .

a. fetch, decode, and execute b. data bus, address bus, control bus
c. SCSI, Fire wire, USB d. None of the above
118 A control bus with eight wires can define ________ operations.

a. 216 b. 512 c. 256 d. 64


119 If the memory has 232 words, the address bus needs to have ________wires.

a. 64 b. 512 c. 256 d. 32
120 A ________ is a storage device to which the user can write information only once.

a. CD-RW b. CD-R c. DVD d. None of


the above
121 A ________ is a storage device that can undergo multiple writes and erasures.

a. CD-RW b. CD-R c. DVD d. None of


the above
122 Multi-programming requires a ________ operating-system.

a. Personal system b. Time sharing c. Real-time system d. Parallel


system
123 DOS stands for: *

a. Demand Open Sources b. Disk Operating System


c. Device Outer Shell d. Direct Operating System
124 What binary value is equivalent to the hex number C43A?
a. 1100100100010110 b. 1100110101111010
c. 1100010000111010 d. 1100001101011101
125 What features of transistors made them superior for computers, compared with vacuum
tubes? *

a. They were more expensive than tubes but lasted longer and were cooler in temperature.
b. They didn't last as long as tubes but were less expensive.
c. They were cheaper and smaller than tubes.
d. They were cheaper, smaller, and cooler than tubes and lasted longer.
126 DSL speeds range from:

a. 256 Kbps to 1.5 Mbps b. 256 Mbps to 15 Mbps


c. 56 Kbps to 256 Kbps d. 100 Kbps to 156 Kbps
127 What uniquely identifies a row in a table? *

a. Index b. Field c. Primary key d. Tuple


128 A....... is a bot that actively reproduces itself across a network

a. Virus b. Troyjan c. Worm d. None of the above


129 Which of the following is not a valid DBMS?

a. SQL Server b. C++ c. Oracle d. DB2


130 Which is not a valid software development model? *

a. Waterfall b. Degradation c. Evolution d. Spiral e.


Incremental
131 What is the standard port number for HTTP?

a. 16 b. 32 c. 64 d. 80
132 A ____________ is used as a visual model for describing a program's logical steps

a. Class diagram b. Flowchart c. Use case diagram d. Design


document
133 Which of the following SQL SELECT options is used to organize the data being returned? *

a. SORT BY b. ORDER BY c. WHERE d. ARRANGE


134 With _________ the microchip is organized so that a section of memory cells is erased in a
single action.

a. ROM b. Flash c. PROM d. EEPROM


135 Which of the following converts source code into a computer language and results in an
executable file?

a. Interpreter b. Compiler c. Translator d. IDE


136 Which is not a step of the database design process?
a. Create the tables b. Create the relationships c. Investigate d. Add
the data
137 A binary operator is applied to ________ relation(s) and creates an output of ________
relation(s).

a. two, one b. one, one c. three, one d. one, two


138 A unary operator is applied to ________ relation(s) and creates an output of ________
relation(s).

a. two, one b. one, one c. three, one d. one, two


139 If you want to change the value of an attribute of a tuple, you use the ________ operation

a. ORDER BY b. JOIN c. INSERT d. UPDATE


140 The operation that takes two relations and combines them based on common attributes is
the ________ operation.

a. JOIN b. PROJECT c. UPDATE d. INSERT


141 The unary ________ operation always results in a relation that has exactly one more row
than the original relation.

a. JOIN b. DELETE c. UPDATE d. INSERT


142 Which of the following is OSI layer of repeater?

a. Data Link b. Network c. Physical d. Transport


143 ________ is a protocol for accessing and transferring documents on the WWW.

a. FTP b. SMTP c. HTTP d. All of the above


144 ________ is a protocol for email services.

a. FTP b. SMTP c. HTTP d. All of the above


145 ________ is a protocol for file transfer.

a. FTP b. SMTP c. HTTP d. All of the above


146 There are ________ basic constructs in computer -science.

a. 5 b. 4 c. 6 d. 3
147 The ________ construct uses a set of actions one after another.

a. repetition b. decision c. sequence d. All of the above


148 The ________ construct tests a condition.

a. repetition b. decision c. sequence d. All of the above


149 The ________ construct handles repeated actions.

a. repetition b. decision c. sequence d. All of the above


150 In ________ sort, the item that goes into the sorted list is always the first item in the
unsorted list.

a. bubble b. selection c. insertion d. None of the above


151 In ________ sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the unsorted list.

a. bubble b. selection c. insertion d. None of the above


152 In ________ sort, the smallest item moves to the beginning of the unsorted list. There is no
one-to-one swapping.

a. bubble b. selection c. insertion d. None of the above


153 ________ is a basic algorithm in which we want to find the location of a target in a list of
items.

a. Binary b. looking c. sequential d. searching


154 We use a ________ search for an unordered list.

a. Binary b. random c. sequential d. searching


155 We use a ________ search for an ordered list.

a. Binary b. random c. sequential d. searching


156 C, C++, and Java can be classified as ________ languages.

a. primary-level b. high-level c. object-oriented d. All of the


above
157 Which of the following is a unary operator?

a. project b. intersection c. difference d. update


158 You want to create a relation called New that contains tuples that belong to both relation A
and relation B. For this, you can use the ________ operation

a. project b. intersection c. difference d. update


159 The purpose of HTTP is to

a. Format Web pages b. Transfer Web pages


c. Transfer address d. Transfer data

160 What is the positional value of the 7 in the base 8 number 2715?

a. 16 b.8 c. 64 d.100
161 Which of the following is not one of the basic Boolean operators?

a. AND b. OR c. NOT d. XOR


162 The process of arranges the disk's surface into addressable areas and sets up the disk's
basic directory tree structure
a. Partitioning b. Set up c. Booting d. Formatting
163 Which of the following circuit types is used to create SRAM?

a. Decoder b. Flip-flop c. LCD d. ROM


164 A _______________ in computer terminology is a set of wires and protocols designed to
facilitate data transfer

a. Gate b. Bus c. Boolean circuit d. CPU

Trang 13

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs)
focuses on “File Management Systems”.

1. MFD stands for?


a) Main File Directory
b) Memory File Directory
c) Master File Directory
d) Master Format Directory
View Answer
Answer: c
Explanation: MFD is Master File Directory. MFD lists names and characteristics of every
file in volume. It also lists any subdirectories.
2. The users are allowed to read information in directories.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Directories maintain the hierarchical structure of the
file system.
3. ___________ is created when a user opens an account in the computer system.
a) RFD
b) Subdirectory
c) MFD
d) SFD
View Answer
Answer: b
Explanation: A subdirectory is created when a user opens an account in the computer
system. It is treated as a file, though flagged in MFD as subdirectory.
4. A filename without path information.
a) File name
b) Complete filename
c) Directory name
d) Relative filename
View Answer
Answer: d
Explanation: The answer is Relative filename. A relative filename is a name without path
information. It appears in the directory listings, folders.
5. Two or three characters appended to relative filename separated by a period.
a) status
b) identifier
c) extension
d) descriptor
View Answer
Answer: c
Explanation: Extensions are added to filenames. The extensions help in identifying the
file type.
6. Files that maintain the hierarchical structure of the file system.
a) Descriptors
b) Directories
c) Modifiers
d) Relative files
View Answer
Answer: b
Explanation: Directories are the files that maintain the hierarchical structure of the file
system. The users are allowed to read information in directories.
7. Files in which users store information?
a) Info files
b) Ordinary files
c) Special files
d) Complex files
View Answer
Answer: b
Explanation: The answer is Ordinary files. Users store information in ordinary files. Their
protections is based on user requests and are related to various file functions.
8. The files that appear as entries in the directories.
a) Ordinary files
b) Special files
c) Duplicate files
d) Sub directories
View Answer
Answer: b
Explanation: The special files appear as entries in the directories. They are the device
drivers providing i/O hardware interface.
9. Number of regions of the disk in a UNIX files management system.
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: There are 4 regions in which the disk is divided. The first is for booting,
second contains the disk size, third includes the list of definitions and the remaining
region contains the free blocks available.
10. Several instructions execution simultaneously in _________
a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
Explanation: The answer is parallel processing. In parallel processing, the several
instructions are executed simultaneously.
This set of Database Multiple Choice Questions & Answers (MCQs) focuses on
“Hashing techniques”.

1. If h is any hashing function and is used to hash n keys in to a table of size m, where
n<=m, the expected number of collisions involving a particular key x is :
a) Less than 1
b) Less than n
c) Less than m
d) Less than n/2
View Answer
Answer: a
Explanation: Hashing is also a method of sorting key values in a database table in an
efficient manner.
2. A technique for direct search is
a) Binary Search
b) Linear Search
c) Tree Search
d) Hashing
View Answer
Answer: d
Explanation: Hashing is one way to enable security during the process of message
transmission when the message is intended for a particular recipient only.
3. The searching technique that takes O (1) time to find a data is
a) Linear Search
b) Binary Search
c) Hashing
d) Tree Search
View Answer
Answer: c
Explanation: A formula generates the hash, which helps to protect the security of the
transmission from unauthorized users.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate
Now!
advertisement
4. The goal of hashing is to produce a search that takes
a) O(1) time
b) O(n2 )time
c) O(log n ) time
d) O(n log n ) time
View Answer
Answer: a
Explanation: Time complexity is given by the big oh notation.
5. Consider a hash table of size seven, with starting index zero, and a hash function (3x
+ 4)mod7. Assuming the hash table is initially empty, which of the following is the
contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using
closed hashing? Note that ‘_’ denotes an empty location in the table.
a) 8, _, _, _, _, _, 10
b) 1, 8, 10, _, _, _, 3
c) 1, _, _, _, _, _,3
d) 1, 10, 8, _, _, _, 3
View Answer
Answer: b
Explanation: A formula generates the hash, which helps to protect the security of the
transmission from unauthorized users.
Check this: RDBMS MCQ | Programming Books
6. A hash table can store a maximum of 10 records, currently there are records in
location 1, 3,4,7,8,9,10. The probability of a new record going into location 2, with hash
functions resolving collisions by linear probing is
a) 0.1
b) 0.6
c) 0.2
d) 0.5
View Answer
Answer: b
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
7. Key value pairs is usually seen in
a) Hash tables
b) Heaps
c) Both Hash tables and Heaps
d) Skip list
View Answer
Answer: a
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
8. What is the best definition of a collision in a hash table?
a) Two entries are identical except for their keys
b) Two entries with different data have the exact same key
c) Two entries with different keys have the same exact hash value
d) Two entries with the exact same key have different hash values
View Answer
Answer: a
Explanation: This level is the root of the tree.
9. Which of the following scenarios leads to linear running time for a random search hit
in a linear-probing hash table?
a) All keys hash to same index
b) All keys hash to different indices
c) All keys hash to an even-numbered index
d) All keys hash to different even-numbered indices
View Answer
Answer: a
Explanation: If all keys hash to the same location then the i-th inserted key would need i
lookups to be found. The probability of looking up i-th key is 1/n (since it’s random). If
you know some probability it’s trivial to show that such lookups have linear time.
10. Breadth First Search is used in
a) Binary trees
b) Stacks
c) Graphs
d) All of the mentioned
View Answer
Answer: c
Explanation: Hashing is used to index and retrieve items in a database because it is
easier to find the item using the shortened hashed key than using the original value.
Database Management System MCQ (Multiple Choice
Questions)
1. What is the full form of DBMS?
a) Data of Binary Management System
b) Database Management System
c) Database Management Service
d) Data Backup Management System
View Answer
Answer: b
Explanation: DBMS is abbreviated as Database Management System. Database
Management System stores the data and allows authorized users to manipulate and
modify the data.
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and
managed
d) Organized collection of data that cannot be updated
View Answer
Answer: c
Explanation: It is defined as an organized collection of data or information for easy
access, updating, and management in a computer.
3. What is DBMS?
a) DBMS is a collection of queries
b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
View Answer
Answer: d
Explanation: DBMS is nothing but a storehouse wherein the authorized user can create
a database to store, modify or retrieve the organized data in the table. It can be modified
or retrieved by users who have access to DBMS only.
4. Who created the first DBMS?
a) Edgar Frank Codd
b) Charles Bachman
c) Charles Babbage
d) Sharon B. Codd
View Answer
Answer: b
Explanation: Charles Bachman along with his team invented the first DBMS known as
Integrated Data Store (IDS).
5. Which type of data can be stored in the database?
a) Image oriented data
b) Text, files containing data
c) Data in the form of audio or video
d) All of the above
View Answer
Answer: d
Explanation: The reason for creating the database management system was to store
large data and these data can be of any form image, text, audio, or video files, etc.
DBMS allows the users to store and access the data of any format.
advertisement
6. In which of the following formats data is stored in the database management system?
a) Image
b) Text
c) Table
d) Graph
View Answer
Answer: c
Explanation: The data is stored in a table format intended to manage the storage of data
and manipulate stored data to generate information.
7. Which of the following is not a type of database?
a) Hierarchical
b) Network
c) Distributed
d) Decentralized
View Answer
Answer: d
Explanation: Different types are:
1) Centralized
2) Distributed
3) Relational
4) NoSQL
5) Cloud
6) Object-oriented
7) Hierarchical
8) Network
8. Which of the following is not an example of DBMS?
a) MySQL
b) Microsoft Acess
c) IBM DB2
d) Google
View Answer
Answer: d
Explanation: MySQL, Microsoft Access, IBM DB2 are database management systems
while Google is a search engine. MySQL is a Linux-based database management
system, Microsoft Access is a tool that is a part of Microsoft Office used to store data,
IBM DB2 is a database management system developed by IBM. Google’s Bigtable is the
database that runs Google’s Internet search, Google Maps, YouTube, Gmail, and other
products.
9. Which of the following is not a feature of DBMS?
a) Minimum Duplication and Redundancy of Data
b) High Level of Security
c) Single-user Access only
d) Support ACID Property
View Answer
Answer: c
Explanation: Single-user Access only” is not a feature of DBMS. DBMS allows multiple
users to access and manipulate the database concurrently. It provides mechanisms to
handle concurrent access and ensure data consistency and integrity among multiple
users.
The important features of a database management system are:

 Minimum Duplication and Redundancy of Data


 High Level of Security
 Mulitple-user Access
 Support ACID Property

10. Which of the following is a feature of the database?


a) No-backup for the data stored
b) User interface provided
c) Lack of Authentication
d) Store data in multiple locations
View Answer
Answer: b
Explanation: The important features are:
1) Provides backup for the data stored by the user and the user can retrieve the data
whenever required.
2) Provides User-interface to access the data.
3) Only authorized users can access the stored data.
4) Data is stored in one central location but multiple authorized users can access the
data.
11. Which of the following is not a function of the database?
a) Managing stored data
b) Manipulating data
c) Security for stored data
d) Analysing code
View Answer
Answer: d
Explanation: It allows authorized users to update, store, manipulate, or access data.
Since data is stored in table format it is easy to access the data and perform the required
functions. It also removes duplicate and redundant data.
12. Which of the following is a function of the DBMS?
a) Storing data
b) Providing multi-users access control
c) Data Integrity
d) All of the above
View Answer
Answer: d
Explanation: The purpose of creating DBMS was to store the data. The data stored in
the database management system can be can accessed by multiple users if the access
is provided. The data stored will be accurate and complete hence providing data
integrity.
13. Which of the following is a component of the DBMS?
a) Data
b) Data Languages
c) Data Manager
d) All of the above
View Answer
Answer: d
Explanation: The components of DBMS are as follows:
1) Hardware: Like a hard drive, monitor, etc.
2) Software: Provides a user interface
3) Data Manager: Manages operations of DBMS.
4) Data: The collection of information on the DB is known as data.
5) Data Languages: Languages like DDL, DML, DAL, and DCL allow to perform
operations like creating, modifying, storing, or retrieving data.
14. Which of the following is known as a set of entities of the same type that share same
properties, or attributes?
a) Relation set
b) Tuples
c) Entity set
d) Entity Relation model
View Answer
Answer: c
Explanation: In the actual world, an entity is a distinct “thing” or “object” from all other
objects. For example: Each employee of an organization is an entity.
15. What is information about data called?
a) Hyper data
b) Tera data
c) Meta data
d) Relations
View Answer
Answer: c
Explanation: Information about data is known as Metadata. Metadata describes the data
in detail by providing additional information like type, length of the data, etc. Metadata
helps the user to understand the data.
16. What does an RDBMS consist of?
a) Collection of Records
b) Collection of Keys
c) Collection of Tables
d) Collection of Fields
View Answer
Answer: c
Explanation: It consists of a collection of tables i.e., the data is organized in tabular
format. The columns of the relation are known as Fields and rows of the relation are
known as fields. Constraints in a relation are known as Keys.
17. The values appearing in given attributes of any tuple in the referencing relation must
likewise occur in specified attributes of at least one tuple in the referenced relation,
according to _____________________ integrity constraint.
a) Referential
b) Primary
c) Referencing
d) Specific
View Answer
Answer: a
Explanation: Consider 2 relations r1 and r2. r1 may include among its attributes the
primary key of relation r2. This attribute is called a foreign key from r1, referencing r2.
The relation r1 is also called the referencing relation of the foreign key dependency, and
r2 is called the referenced relation of the foreign key.
18. _____________ is a hardware component that is most important for the operation of
a database management system.
a) Microphone
b) High speed, large capacity disk to store data
c) High-resolution video display
d) Printer
View Answer
Answer: b
Explanation: Since all the data are stored in form of memory in the disk, a high speed,
and large-capacity disk is required for the operation of the database management
system.
19. The DBMS acts as an interface between ________________ and
________________ of an enterprise-class system.
a) Data and the DBMS
b) Application and SQL
c) Database application and the database
d) The user and the software
View Answer
Answer: c
Explanation: A database management system is an application that acts as an interface
between the user and the database. The user interacts with the application to access
data.
20. The ability to query data, as well as insert, delete, and alter tuples, is offered by
____________
a) TCL (Transaction Control Language)
b) DCL (Data Control Language)
c) DDL (Data Definition Langauge)
d) DML (Data Manipulation Langauge)
View Answer
Answer: d
Explanation: A query is a request for data or information. Relational Schema is the
design and structure of the relation. DDL consists of commands that help in modifying.
DML performs the change in the values of the relation.
21. ______________ is a set of one or more attributes taken collectively to uniquely
identify a record.
a) Primary Key
b) Foreign key
c) Super key
d) Candidate key
View Answer
Answer: c
Explanation: Foreign key creates a relationship between two relations. Super key is the
superset of all the keys in a relation. A candidate key is used to identify tuples in a
relation.
22. Which command is used to remove a relation from an SQL?
a) Drop table
b) Delete
c) Purge
d) Remove
View Answer
Answer: a
Explanation: Delete command is used to delete the existing record from the table. The
drop table deletes the whole structure of the relation. Purge removes the table which
cannot be obtained again.
23. Which of the following set should be associated with weak entity set for weak entity
to be meaningful?
a) Neighbour set
b) Strong entity set
c) Owner set
d) Identifying set
View Answer
Answer: d
Explanation: Every weak entity must be linked to an identifying entity; in other words, the
existence of the weak entity set is contingent on the presence of the identifying entity
set. The weak entity set that the identifying entity set identifies is said to be owned by the
identifying entity set. Owner entity set is another name for it.
24. Which of the following command is correct to delete the values in the relation
teaches?
a) Delete from teaches;
b) Delete from teaches where Id =’Null’;
c) Remove table teaches;
d) Drop table teaches;
View Answer
Answer: a
Explanation: To delete the entries from the table Delete from table command should be
used.
25. Procedural language among the following is __________
a) Domain relational calculus
b) Tuple relational calculus
c) Relational algebra
d) Query language
View Answer
Answer: c
Explanation: Non-Procedural Languages are Domain relational calculus and Tuple
relational calculus. Relational algebra is a procedural language that takes input in the
form of relation and output generated is also a relation.
26. _________________ operations do not preserve non-matched tuples.
a) Left outer join
b) Inner join
c) Natural join
d) Right outer join
View Answer
Answer: b
Explanation: Left outer join returns all the rows from the table that is on the left side and
matching rows on the right side of the join. Inner join returns all rows when there is at
least one match in BOTH tables. Natural join returns the common columns from the
tables being joined. A right outer join returns all the rows from the table that is on the
right side and matching rows on the left side of the join.
27. Which forms have a relation that contains information about a single entity?
a) 4NF
b) 2NF
c) 5NF
d) 3NF
View Answer
Answer: a
Explanation: If and only if, for each of its non-trivial multivalued dependencies X
\twoheadrightarrow Y, a table is in 4NF. X is a superkey—that is, X is either a candidate
key or a superset thereof.
28. The top level of the hierarchy consists of ______ each of which can contain _____.
a) Schemas, Catalogs
b) Schemas, Environment
c) Environment, Schemas
d) Catalogs, Schemas
View Answer
Answer: d
Explanation: Schemas represent the logical configuration of the DBMS. Catalogs consist
of metadata of the objects and system settings used.
29. _______ indicates the maximum number of entities that can be involved in a
relationship.
a) Greater Entity Count
b) Minimum cardinality
c) Maximum cardinality
d) ERD
View Answer
Answer: c
Explanation: The term cardinality refers to the uniqueness of data values included in a
single column (attribute) of a table in SQL (Structured Query Language).
30. The user IDs can be added or removed using which of the following fixed roles?
a) db_sysadmin
b) db_accessadmin
c) db_securityadmin
d) db_setupadmin
View Answer
Answer: b
Explanation: Along with security, as the name suggests the db_accessadmin role also
handles access. db_sysadmin refers to the system administrator. db_securityadmin as
the name suggests it involves granting or declining permission to access the data
ensuring security.
31. Why the following statement is erroneous?

SELECT dept_name, ID, avg (salary)


FROM instructor
GROUP BY dept_name;

a) Dept_id should not be used in group by clause


b) Group by clause is not valid in this query
c) Avg(salary) should not be selected
d) None
View Answer
Answer: a
Explanation: Any property that does not occur in the group by clause must only appear
in an aggregate function if it also appears in the select clause; otherwise, the query is
considered incorrect.
32. The traditional storage of data organized by the customer, stored in separate folders
in filing cabinets is an example of ______________ type of ‘database’ management
system.
a) Object-oriented database management system
b) Relational database management system
c) Network database management system
d) Hierarchical database management system
View Answer
Answer: d
Explanation: In an object-oriented database management system, the data is stored in
the form of objects. In a relational DBMS, the data is stored in the form of tables.
Hierarchy is obtained by Parent-Child Relationship. Parent-Child Relationship Type is
basically a 1:N relationship.
33. After groups have been established, SQL applies predicates in the ___________
clause, allowing aggregate functions to be used.
a) Where
b) Having
c) Group by
d) With
View Answer
Answer: d
Explanation: The “with” clause was introduced to reduce the complexity of the queries
which are lengthy. The “with” clause allows you to define a temporary relation whose
definition is only visible to the query in which it appears.
34. Which of the following is not the utility of DBMS?
i) Backup ii) Loading iii) Process Organization iv) File organization
a) i, ii, and iv only
b) i, ii and iii only
c) i, iii and iv only
d) All i, ii, iii, and iv
View Answer
Answer: a
Explanation: Backup utility is used to create a copy of the db as a backup. Loading utility
is used to load existing file. File organization is used to relocate the files and create new
access path. Processing is not an utility.
35. What does a foreign key combined with a primary key create?
a) Network model between the tables that connect them
b) Parent-Child relationship between the tables that connects them
c) One to many relationship between the tables that connects them
d) All of the mentioned
View Answer
Answer: a
Explanation: Using the two relationships mother and father gives us a record of a child’s
mother, even if we don’t know who the father is; if the ternary connection parent is used,
a null value is necessary. In this scenario, binary relationship sets are preferred.
36. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency
View Answer
Answer: c
Explanation: Pointers are used to access data with great speed and accuracy.
Consistency is maintained using locks.
37. Which of the following is correct regarding the file produced by a spreadsheet?
a) can be used as it is by the DBMS
b) stored on disk in an ASCII text format
c) all of the mentioned
d) none of the mentioned
View Answer
Answer: a
Explanation: For updating the value in ASCII text format, a regular text file is used.
38. What is the function of the following command?

Delete from r where P;

a) Clears entries from relation


b) Deletes relation
c) Deletes particular tuple from relation
d) All of the mentioned
View Answer
Answer: c
Explanation: In the command the P gives condition to delete a particular tuple.
39. ______ resembles Create view.
a) Create table . . . as
b) Create view as
c) Create table . . .like
d) With data
View Answer
Answer: a
Explanation: The ‘create table… as’ statement is similar to the ‘create view… as’
statement in that both are defined with queries. The main distinction is that table
contents are set when the table is built, whereas view contents always reflect the current
query result.
40. The query specifying the SQL view is said to be updatable if it meets which of the
following conditions?
a) select clause contains relation attribute names but not have expressions, aggregates,
or distinct specification
b) from clause has 1 relation
c) query does not have group by or having clause
d) All of the mentioned
View Answer
Answer: d
Explanation: To update the view in sql all the conditions must be satisfied.
41. When the “ROLLUP” operator for expression or columns within a “GROUP BY”
clause is used?
a) Find the groups that make up the subtotal in a row
b) Create group-wise grand totals for the groups indicated in a GROUP BY clause
c) Group expressions or columns specified in a GROUP BY clause in one direction, from
right to left, for computing the subtotals
d) To produce a cross-tabular report for computing subtotals by grouping phrases or
columns given within a GROUP BY clause in all available directions
View Answer
Answer: c
Explanation: A view can be thought of as a virtual table that gets its data from one or
more table columns.
42. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation
b) Concatenation
c) Relational-and
d) All of the mentioned
View Answer
Answer: b
Explanation: Concatenation in DBMS is used to join two or more table fields of the same
table or different tables. Example inst sec and student sec.
43. Which of the following is the subset of SQL commands used to manipulate Oracle
Structures, including tables?
a) Data Described Language
b) Data Retrieval Language
c) Data Manipulation Language
d) Data Definition Language
View Answer
Answer: d
Explanation: DDLs are used to define schema and table characters and consist of
commands that help in modifying. DML performs the change in the values of the relation.
44. Which of the following functions construct histograms and use buckets for ranking?
a) Ntil()
b) Newtil()
c) Rank()
d) All of the mentioned
View Answer
Answer: a
Explanation: ntile(n) returns the number of the bucket in which each tuple is stored, with
bucket numbers beginning with 1.
45. __________ command is used in SQL to issue multiple CREATE TABLE, CREATE
VIEW and GRANT statements in a single transaction.
a) CREATE CLUSTER
b) CREATE PACKAGE
c) CREATE SCHEMA
d) All of the mentioned
View Answer
Answer: c
Explanation: A schema is a description of a system’s structure in a formal language
supported by the database management system, and it refers to data organization as a
blueprint for how a db is built.
46. Which of the following key is required in to handle the data when the encryption is
applied to the data so that the unauthorised user cannot access the data?
a) Primary key
b) Authorised key
c) Encryption key
d) Decryption key
View Answer
Answer: d
Explanation: The encryption key is used to encrypt the message. Even if the message is
intercepted by an enemy, the enemy will be unable to decrypt and interpret the message
because he lacks the key.
47. Which of the following is known as the process of viewing cross-tab with a fixed
value of one attribute?
a) Dicing
b) Pivoting
c) Slicing
d) Both Pivoting and Dicing
View Answer
Answer: c
Explanation: Slice procedure takes one dimension from a cube and turns it into a new
sub-cube. Dice takes two or more dimensions from a cube and creates a new sub-cube
from them.
48. For designing a normal RDBMS which of the following normal form is considered
adequate?
a) 4NF
b) 3NF
c) 2NF
d) 5NF
View Answer
Answer: b
Explanation: Because most 3NF tables are free of insertion, update, and deletion
anomalies, an RDBMS table is sometimes regarded as “normalized” if it is in the Third
Normal Form.
49. Which of the following is popular for applications such as storage of log files in a
database management system since it offers the best write performance?
a) RAID level 0
b) RAID level 1
c) RAID level 2
d) RAID level 3
View Answer
Answer: b
Explanation: RAID level 0 refers to data stripping. RAID level 1 refers to disk mirroring
with block striping. RAID level 2 refers to bit-level stripping and RAID level 3 refers to
byte-level striping with dedicated parity.
50. Which of the following represents a query in the tuple relational calculus?
a) { }{P(t) | t }
b) {t | P(t)}
c) t | P() | t
d) All of the mentioned
View Answer
Answer: b
Explanation: A nonprocedural query language is the tuple relational calculus. It specifies
the needed information but does not provide a detailed strategy for obtaining it.
51. The oldest DB model is _______________
a) Network
b) Physical
c) Hierarchical
d) Relational
View Answer
Answer: a
Explanation: Network model has data stored in a hierarchical network flow. In a
relational DBMS, the data is stored in the form of tables. Hierarchy is obtained by
Parent-Child Relationship
52. Evaluate the statements issued by the DBA in the given sequence if OE and SCOTT
are the users and the ORDERS table is owned by OE.

CREATE ROLE r1;


GRANT SELECT, INSERT ON oe. orders TO r1;
GRANT r1 TO scott;
GRANT SELECT ON oe. orders TO scott;
REVOKE SELECT ON oe.orders FROM scott;

What would be the outcome after executing the statements?


a) The REVOKE statement would give an error because the SELECT privilege has been
granted to the role R1
b) The REVOKE statement would remove the SELECT privilege from SCOTT as well as
from the role R1
c) SCOTT would be able to query the OE.ORDERS table
d) SCOTT would not be able to query the OE.ORDERS table
View Answer
Answer: c
Explanation: To perform operations on objects, the REVOKE statement is used to
revoke rights from a single user or role, or from all users.
53. Which of the following establishes a top-to-bottom relationship among the items?
a) Relational schema
b) Network schema
c) Hierarchical schema
d) All of the mentioned
View Answer
Answer: c
Explanation: A data model in which the data is structured into a tree-like structure is
known as a hierarchical model. The structure allows information to be represented using
parent-child relationships.
54. A major goal of the db system is to minimize the number of block transfers between
the disk and memory. Which of the following helps in achieving this goal?
a) Secondary storage
b) Storage
c) Catalog
d) Buffer
View Answer
Answer: d
Explanation: Every block has a copy on disc, however, the copy on the disc may be an
earlier version of the block than the version in the buffer.
55. What happens if a piece of data is stored in two places in the db?
a) Storage space is wasted & Changing the data in one spot will cause data
inconsistency
b) In can be more easily accessed
c) Changing the data in one spot will cause data inconsistency
d) Storage space is wasted
View Answer
Answer: a
Explanation: One of the main features of a database management system is minimum
data duplication and redundancy. Hence, is always consistent and so there is no
duplication.
56. The logical design, and the snapshot of the data at a given instant in time is known
as?
a) Instance & Relation
b) Relation & Schema
c) Domain & Schema
d) Schema & Instance
View Answer
Answer: d
Explanation: Instance is an instance of time, the relation is also known as table consists
of data with similar characteristics, Domain is the collection of values that an attribute
can contain and schema is a representation.
DBMS MCQ
This section of interview questions and answers focuses on "Database Management
System". One shall practice these interview questions to improve their concepts for
various interviews such as campus interviews, walk-in interviews, company interviews,
placements, entrance exams and other competitive exams.

1) Which of the following is generally used for performing tasks like creating the structure
of the relations, deleting relation?

a. DML(Data Manipulation Language)


b. Query
c. Relational Schema
d. DDL(Data Definition Language)

Hide Answer Workspace

Answer: D

Explanation: The term "DDL" stands for Data Definition Language, used to perform all
other essential tasks such as deleting relation and related schemas in defining the
structure relation.

2) Which of the following provides the ability to query information from the database and
insert tuples into, delete tuples from, and modify tuples in the database?

a. DML(Data Manipulation Language)


b. DDL(Data Definition Language)
c. Query
d. Relational Schema

Hide Answer Workspace

Answer: A

Explanation: The term "DML" stands for the Data Manipulation Language used to
perform the required changes in the relation's values.
3) The given Query can also be replaced with_______:

1. SELECT name, course_id


2. FROM instructor, teaches
3. WHERE instructor_ID= teaches_ID;

a. Select name,course_id from teaches,instructor where instructor_id=course_id;


b. Select name, course_id from instructor natural join teaches;
c. Select name, course_id from instructor;
d. Select course_id from instructor join teaches;

Hide Answer Workspace

Answer: B

Explanation: Join clause joins two tables by matching the common column

4) Which one of the following given statements possibly contains the error?

a. select * from emp where empid = 10003;


b. select empid from emp where empid = 10006;
c. select empid from emp;
d. select empid where empid = 1009 and Lastname = 'GELLER';

Hide Answer Workspace

Answer: D

Explanation: The Query given in option D does not contain the "from" clause, which
specifies the relation from which the values have to be selected or fetched. Therefore
the correct answer is D.

5) Ready the Query carefully:

1. SELECT emp_name
2. FROM department
3. WHERE dept_name LIKE ' _____ Computer Science';
In the above-given Query, which of the following can be placed in the Query's blank
portion to select the "dept_name" that also contains Computer Science as its ending
string?

a. &
b. _
c. %
d. $

Hide Answer Workspace

Answer: C

Explanation: In the above-given Query, the "%" (like) operator will be used, which is
generally used while searching for a certain pattern in the strings. It represents the
single and multiple characters. In this case, it used with "Where "louse to select the
"dept_name" that contains the Computer Since as its ending string. To understand it
more clearly, consider the following syntax:

Syntax

SELECT column1, column2, ...


FROM table_name
WHERE columnN LIKE pattern;

6) What do you mean by one to many relationships?

a. One class may have many teachers


b. One teacher can have many classes
c. Many classes may have many teachers
d. Many teachers may have many classes

Hide Answer Workspace

Answer: B

Explanation: We can understand the "one to many" relationship as a teacher who may
have more than one class to attend.
7) In the following Query, which of the following can be placed in the Query's blank portion
to display the salary from highest to lowest amount, and sorting the employs name
alphabetically?

1. SELECT *
2. FROM instructor
3. ORDER BY salary ____, name ___;

a. Ascending, Descending
b. Asc, Desc
c. Desc, Asc
d. All of the above

Hide Answer Workspace

Answer: C

Explanation: To sort the salary from highest to lowest amount and display the
employee's name alphabetically, one can use the "Desc and Asc" in the above-given
Query.

8) The given Query can be replaced with ____________:

1. SELECT name
2. FROM instructor1
3. WHERE salary <= 100000 AND salary >= 90000;

a.

1. SELECT name
2. FROM instructor1
3. WHERE salary BETWEEN 100000 AND 90000

b.

1. SELECT name
2. FROM instructor|
3. WHERE salary BETWEEN 90000 AND 100000;

c.
1. SELECT name
2. FROM instructor1
3. WHERE salary BETWEEN 90000 AND 100000;

d.

1. SELECT name
2. FROM instructor!
3. WHERE salary <= 90000 AND salary>=100000;

Hide Answer Workspace

Answer: C

Explanation: The "SQL" contains a comparison known as the "BETWEEN," which is also
used in one of the given queries, as you can see. The "BETWEEN" operator is generally
used to simplify the "WHERE" clause that is used to specify that the value is greater
than one value or greater than some values, less than one or more values.

9) A Database Management System is a type of _________software.

a. It is a type of system software


b. It is a kind of application software
c. It is a kind of general software
d. Both A and C

Hide Answer Workspace

Answer: A

Explanation: The DBMS (or Database Management System) is a kind of system


software used for several operations such as creating tables/databases, storing data,
managing databases. It also allows modifying the data stored in the database as well.

10) The term "FAT" is stands for_____

a. File Allocation Tree


b. File Allocation Table
c. File Allocation Graph
d. All of the above

Hide Answer Workspace

Answer: B

Explanation: The term "FAT" can be described as a file structure (or file architecture).
In which all the information about the files where they are stored and where all these
files need to be stored or in which directory, all that information generally stored in
the file structure. Therefore the Operating system creates a table in which all the files
and clusters are stored, known as the file allocation table.

11) Which of the following can be considered as the maximum size that is supported by
FAT?

a. 8GB
b. 4GB
c. 4TB
d. None of the above

Hide Answer Workspace

Answer: B

Explanation: The files with a size of less than 4 GB or equal to 4GB are easily supported
by the FAT. All files with a size greater than the maximum size (or is 4Gb) are not
supported by the FAT.

12) The term "NTFS" refers to which one of the following?

a. New Technology File System


b. New Tree File System
c. New Table type File System
d. Both A and C

Hide Answer Workspace


Answer: A

Explanation: In the old operating systems, the file structure used to store and manage
files is called the FAT 32 ( or File Allocation Table). Later, when the technology evolves
with time, a new type of file system is introduced, known as the New Technology File
System. It overcomes all the drawbacks, issues that exist in FAT file architecture and
has many other new features such as it is fast, it can handle files whose size is even
greater than 4 GB.

13) Which of the following can be considered as the maximum size that is supported by
NTFS?

a. 4GB
b. 16TB
c. 64TB
d. 8TB

Hide Answer Workspace

Answer: A

Explanation: The New Technology File System was introduced in 1993 for the very
first time as a part of new Windows operating systems (Windows NT 3.1).

You may be surprised to know that windows are still using it because of its fast speed
and can support files whose size is up to 16TB (16 terabytes), which is much more than
that file size supported by the old system.

14) A huge collection of the information or data accumulated form several different
sources is known as ________:

a. Data Management
b. Data Mining
c. Data Warehouse
d. Both B and C

Hide Answer Workspace

Answer: C
Explanation: A huge collection of different types of data/information which collected
from many different sources stored in one place is called a data warehouse. It works
just like the standard warehouse, which is generally a type of holding area/building to
store the different types of different goods in huge quantities until they are further
distributed. Therefore the correct answer is Data Warehouse.

15) Which of the following can be used to extract or filter the data & information from the
data warehouse?

a. Data redundancy
b. Data recovery tool
c. Data mining
d. Both B and C

Hide Answer Workspace

Answer: C

Explanation: The tools used to obtain meaningful information or Data from the large
collection of data (or from the Data Warehouses) are known as the Data mining tools.
Through data mining, one can easily filter the useful information or data from the
massive collection of the data. Therefore the correct answer is Data Mining.

16) Which one of the following refers to the copies of the same data (or information)
occupying the memory space at multiple places.

a. Data Repository
b. Data Inconsistency
c. Data Mining
d. Data Redundancy

Hide Answer Workspace

Answer: D

Explanation: The data redundancy generally occurs whenever more than one copy of
the exact same data exists in several different places. Sometimes it may cause data
inconsistency, which can result in an unreliable source of data or information that is
not good for anyone.
17) Which one of the following refers to the "data about data"?

a. Directory
b. Sub Data
c. Warehouse
d. Meta Data

Hide Answer Workspace

Answer: D

Explanation: The Mata Data refers to the type of data that describes the other data or
information.

A general file or document is nothing more than a sequence of bytes that contains
information like file name, file size, and date & time when the document was created
or modified.

To understand it in more details, consider the following example:

For a common music file, the metadata may include the singer's name, the year it was
released, and the lyrics, etc.

18) Which of the following refers to the level of data abstraction that describes exactly
how the data actually stored?

a. Conceptual Level
b. Physical Level
c. File Level
d. Logical Level

Hide Answer Workspace

Answer: B

Explanation: Data abstraction means displaying or sharing only the data that is
needed and hiding from all other data until it is necessary to share it. However, the
data abstraction level that describes how the data was actually stored in the user's
machine (or system) is known as the Physical level. Therefore the correct answer is B.
19) To which of the following the term "DBA" referred?

a. Data Bank Administrator


b. Database Administrator
c. Data Administrator
d. None of the above

Hide Answer Workspace

Answer: B

Explanation: The term "DBA" refers to the Database Administrator that manages the
whole database and updates the database on a regular basis. In short, the database
administrator has the responsibility of the whole database and to maintain it in an
optimal & stable state.

20) In general, a file is basically a collection of all related______.

a. Rows & Columns


b. Fields
c. Database
d. Records

Hide Answer Workspace

Answer: D

Explanation: Whenever we have some related data, information or records, we collect


all those related data (or records), put them together, store them in one place, and
give that collection a name that is known as a file.

21) The term "Data" refers to:

a. The electronic representation of the information( or data)


b. Basic information
c. Row Facts and figures
d. Both A and C

Hide Answer Workspace

Answer: C

Explanation: In general, the term "data" refers to the row facts and figure, whereas
the information referred to as the data, which is really important for someone or a
particular person. Therefore the correct answer is C.

22) Rows of a relation are known as the _______.

a. Degree
b. Tuples
c. Entity
d. All of the above

Hide Answer Workspace

Answer: D

Explanation: In SQL, the relation is represented by a table, and a table is a collection


of rows and columns. Therefore the collection of rows & columns is called the table,
whereas a table is known as the relation in the SQL. So in a relation (or we can say
table), rows are called the tuples. So, the correct answer will be tuples.

23) Which of the following refers to the number of tuples in a relation?

a. Entity
b. Column
c. Cardinality
d. None of the above

Hide Answer Workspace

Answer: C

Explanation: Cardinality refers to the number of tuples of relation because cardinality


represents the number of tuples in a relation.
To understand it in more detail, consider the following given example:

Suppose we have a relation (or table) that contains 30 tuples (or Rows) and four
columns, so the cardinality of our relation will be 30.

24) Which one of the following is a type of Data Manipulation Command?

a. Create
b. Alter
c. Delete
d. All of the above

Hide Answer Workspace

Answer: C

Explanation: In data manipulation language, the command like select, insert, update,
and delete is used to manipulate the information (or data, records), for example create
a table, update table delete table, etc. Therefore the correct answer is C.

25) Which of the following command is a type of Data Definition language command?

a. Create
b. Update
c. Delete
d. Merge

Hide Answer Workspace

Answer: A

Explanation: The Data definition language is generally used to maintain or define the
structure of the database. For example, creating a table, drop table, alter table. In short,
we can say that the command of data definition languages is used to work on the
table's schemas inside the database.
26) Which of the following is a top-down approach in which the entity's higher level can
be divided into two lower sub-entities?

a. Aggregation
b. Generalization
c. Specialization
d. All of the above

Hide Answer Workspace

Answer: C

Explanation: In specialization, the top-down approach is used, and it is apposite to


the generalization.

In the specialization, the higher-level entity can be divided into sub lower entities. It is
generally used for identifying the subset of an entity set which share the distinguishing
characteristics.

To understand it more clearly, consider the following example:

Suppose you have an entity, e.g., A vehicle. So through the specialization, you can be
divided further into sub-entities like two-wheelers and four-wheelers. Therefore the
correct answer is C.

27) In which one of the following, the multiple lower entities are grouped (or combined)
together to form a single higher-level entity?

a. Specialization
b. Generalization
c. Aggregation
d. None of the above

Hide Answer Workspace

Answer: B

Explanation:

The bottom-up approach is used in the generalization. The several lower-level sub-
entities are grouped together to make an individual higher-level entity. In short, we
can say that it is totally the opposite of specialization. To understand it more clearly,
consider the following example:

Example

Suppose you have several lower entities like bus, car, motorbike etc. So, in order to
make a more generalize (or higher level ) entity, you can combine them under a new
higher-level entity such as a vehicle.

28) In a relation database, every tuples divided into the fields are known as the______.

a. Queries
b. Domains
c. Relations
d. All of the above

Hide Answer Workspace

Answer: B

Explanation: In a database, the number of rows inside a table is known as tuples, and
if we further divide those tuples (or rows) into those fields, they become the domains.
So the correct answer will be B.

29) The term "TCL" stands for_____.

a. Ternary Control Language


b. Transmission Control Language
c. Transaction Central Language
d. Transaction Control Language

Hide Answer Workspace

Answer: D

Explanation: The term "TCL" refers to the Transaction Control Language, which is
another language just like the "DDL" and "DML". The commands like commit, save
point, rollback come under the TCL used to control the transactions. Therefore the
correct answer will be D.
30) In the relational table, which of the following can also be represented by the term
"attribute"?

a. Entity
b. Row
c. Column
d. Both B &C

Hide Answer Workspace

Answer: C

Explanation: In the database, the number of rows inside a table is called the tuples,
and the numbers of columns are known as the attributes. Therefore the correct answer
is C.

31) Which of the following refers to the number of attributes in a relation?

a. Degree
b. Row
c. Column
d. All of the above

Hide Answer Workspace

Answer: A

Explanation: The column inside the table is called the attribute, and the total number
of attributes inside the table is called the degree. So, here as we can see, degree refers
to the number of attributes in a relation. Therefore the correct answer is C.

32) Which of the following is used in the application programs to request data from the
database management system?

a. Data Manipulation language


b. Data Definition Language
c. Data Control Language
d. All of the above

Hide Answer Workspace

Answer: A

Explanation: To fetch data from the database management system, generally, the
"select" statement is used. Therefore, the Data Manipulation Language is used in the
application programs while requesting the data from the database management
system.

33) Which one of the following command is used to delete the existing row in a table?

a. Delete
b. Update
c. Insert
d. None of the above

Hide Answer Workspace

Answer: A

Explanation: To delete an existing row in a table the generally, the "delete" command
is used. The "delete" command is one of the commands that belong to the Data
manipulation language.

34) Which of the following commands is used to save any transaction permanently into
the database?

a. Commit
b. Rollback
c. Savepoint
d. None of the above

Hide Answer Workspace

Answer: A
Explanation: The Transaction Control Language is used while working with the
transactions. To save any transaction permanently into the database generally, the
"commit" command is used, by which any changes get reflected permanently into the
database, and they become irreversible.

35) Which one of the following commands is used for removing (or deleting) a relation
forms the SQL database?

a. Delete
b. Drop
c. Remove
d. All of the above

Hide Answer Workspace

Answer: B

Explanation: To removing( or deleting) a relation, the "drop" command is used instead


of delete because here we are working on the objects of the database. So, to maintain
the objects of a database, the Data definition language is used. Therefore the "drop"
command is used to delete a relation form a database instead of using the "delete"
command.

36) Which one of the following commands is used to restore the database to the last
committed state?

a. Savepoint
b. Rollback
c. Commit
d. Both A & B

Hide Answer Workspace

Answer: B

Explanation: As we all know that while working with the Transactions, the Transaction
Control Language is used. To restore the database to the last committed state ( or to
undo the latest changes), the "rollback" command is used that belongs to the
Transaction Control Language.
37) The database management system can be considered as the collection of ______ that
enables us to create and maintain the database.

a. Translators
b. Programs
c. Keys
d. Language activity

Hide Answer Workspace

Answer: B

Explanation: The Database management system can also considered as the set of
programs that enables users to create and maintain the database.

38) The term "DFD" stands for?

a. Data file diagram


b. Data flow document
c. Data flow diagram
d. None of the above

Hide Answer Workspace

Answer: C

Explanation: The term"DFD" stands for the Data Flow Diagram, and to represent the
flow of the data( or information), the data flow diagram is used. The data flow diagram
also helps in understanding how the data is managed in the application. Therefore the
correct answer is C.

39) Which of the following refers collection of the information stored in a database at a
specific time?

a. Independence
b. Instance of the database
c. Schema
d. Data domain

Hide Answer Workspace

Answer: B

Explanation: The collection of data (or information) stored in a database at a particular


moment is known as the instance of the database. Therefore the correct answer is B.

40) The term "SQL" stands for

a. Standard query language


b. Sequential query language
c. Structured query language
d. Server-side query language

Hide Answer Workspace

Answer: C

Explanation: The term "SQL" stands for the structured query language, which is one
of the most widely, used programming languages for relational databases. It can also
be used for managing and organizing data in all sorts of systems in which different
data relationships exist. Therefore the correct answer is C.

41) The term "Data independence" refers to____

a. Data is defined separately and not included in the programs


b. Programs are not dependent on the logical attributes of the data
c. Programs are not dependent on the physical attributes of the data
d. Both B & C

Hide Answer Workspace

Answer:
Explanation: The term "Data independence" refers that the program should not be
dependent on either the logical attributes of data or physical attributes of data.

42) What is the relation calculus?

a. It is a kind of procedural language


b. It is a non-procedural language
c. It is a high-level language
d. It is Data Definition language

Hide Answer Workspace

Answer: B

Explanation: In database management systems, relation calculus is a type of non-


procedural query language that describes what data needs to be retrieved. However,
it does not explain how to retrieve the data.

43) Which one of the following refers to the total view of the database content?

a. Conceptual view
b. Physical view
c. Internal view
d. External view

Hide Answer Workspace

Answer: A

Explanation: The conceptual view refers to the total view of the content available in
the database. Therefore the correct answer is A.

44) For what purpose the DML is provided?

a. Addition of new structure in the database


b. Manipulation & processing of the database
c. Definition of the physical structure of the database system
d. All of the above

Hide Answer Workspace

Answer: B

Explanation: The term "DML" refers to the data manipulation language, which is
commonly used to perform basic operations such as insert data, delete, and update
data in a database. So the correct answer will be B.

45) The term "ODBC" stands for_____

a. Oral database connectivity


b. Oracle database connectivity
c. Open database connectivity
d. Object database connectivity

Hide Answer Workspace

Answer: C

Explanation: The term "ODBC" refers to the Open Database Connectivity that is a SQL
based programming interface introduced by Microsoft.

46) The architecture of a database can be viewed as the ________

a. One level
b. Two-level
c. Three-level
d. Four level

Hide Answer Workspace

Answer: C
Explanation: A database's architecture can be viewed as the three levels of abstraction
that are named as the internal level, external level, and the conceptual level. Therefore
the correct answer is C.

47) In the relation model, the relation are generally termed as ________

a. Tuples
b. Attributes
c. Rows
d. Tables

Hide Answer Workspace

Answer: D

Explanation: In the relation model, the relations are also referred to as the tables
because the relations are considered as the technical name of the table. So the correct
answer is D.

48) The Database Management Query language is generally designed for the _____

a. Support end-users who use English like commands


b. Specifying the structure of the database
c. Support in the development of the complex applications software
d. All of the above

Hide Answer Workspace

Answer: D

Explanation: The database management query language is generally designed by


keeping in mind that it must support the end-users who are familiar with the English-
like commands. It should also boost the process of development of the complex
applications software and helps in specifying the structure of the database.

49) Which of the following keys is generally used to represents the relationships between
the tables?
a. Primary key
b. Foreign key
c. Secondary key
d. None of the above

Hide Answer Workspace

Answer: B

Explanation: To represent the relationships between the various tables in the


database, generally, the foreign key is used. Therefore the correct answer is the foreign
key.

50) Which of the following levels is considered as the level closed to the end-users?

a. Internal Level
b. External Level
c. Conceptual Level
d. Physical Level

Hide Answer Workspace

Answer: B

Explanation: The database's external level is the one and only level that is considered
the closest level to the end-users. So the correct answer will be the B.

51) A computer security protocol for logging-in can be considered as the example of the
______ component of an information system.

a. Data
b. Software
c. Procedure
d. Hardware

Hide Answer Workspace

Answer: C
Explanation: A computer security protocol for logging-in can be considered as the
procedure component of an information system. Therefore the correct answer is C.

52) Which one of the following keyword is used to find out the number of values in a
column?

a. TOTAL
b. COUNT
c. SUM
d. ADD

Hide Answer Workspace

Answer: B

Explanation: The "COUNT" keyword is used to find the total number of values inside
a column. So whenever a user wants to find the total values in a column, he can use
the keyword "COUNT".

53) Which one of the following is commonly used to define the overall design of the
database?

a. Application program
b. Data definition language
c. Schema
d. Source code

Hide Answer Workspace

Answer: C

Explanation: In order to define the overall design of the database, generally, the
schema is used. Therefore the correct answer is C.

54) Which one of the following commands is used to modify a column inside a table?

a. Drop
b. Update
c. Alter
d. Set

Hide Answer Workspace

Answer: C

Explanation: To make manipulations in a column of a specific table, the "alter"


command is used. To understand it more clearly, consider the following example:
1.
Which of the following is the full form of DDL?
Data definition language
Data derivation language
Dynamic data language
Detailed data language
Hide
Wrong Answer
The full form of DDL is Data definition language.
2.
Which of the following is the property of transaction that protects data from system failure?
Atomicity
Isolation
Durability
Consistency
Hide
Wrong Answer
The property durability protects data from system failure.
3.
Which of the following is preserved in execution of transaction in isolation?
Atomicity
Isolation
Durability
Consistency
Hide
Wrong Answer
Consistency is preserved in the execution of transactions in isolation.
4.
Which normalization form is based on the transitive dependency?
1NF
2NF
3NF
BCNF
Hide
Wrong Answer
The 3NF is based on the transitive dependency.
5.
Which is the lowest level of abstraction that describes how the data are actually stored?
Physical
Abstract
View
User
Hide
Wrong Answer
The physical level of abstraction that describes how the data are actually stored.
6.
For performing tasks like creating the structure of the relations, deleting relation, which of the
following is used?
Data definition language
Data derivation language
Dynamic data language
Detailed data language
Hide
Wrong Answer
The Data definition language is used for performing tasks like creating the structure of the
relations, deleting relations.
7.
What is rows of a relation known as?
Degree
Entity
Tuple
None
Hide
Wrong Answer
The rows of a relation is known as tuple.
8.
Which of the following is a command of DDL?
Alter
Delete
Create
All of the above
Hide
Wrong Answer
Both alter and create are DDL Command
9.
During transaction before commit which of the following statement is done automatically in
case of shutdown?
Rollback
Commit
View
Flashback
Hide
Wrong Answer
In case of shutdown, before committing, Rollback is done.
10.
Which of the following is the full form of TCL?
Ternary control language
Transaction control language
Transaction central language
Transmission control language
Hide
Wrong Answer
The full form of TCL is Transaction control language
11.
Which of the following SQL command is used for removing (or deleting) a relation form the
database?
Drop
Delete
Rollback
Remove
Hide
Wrong Answer
The Drop command is used for removing (or deleting) a relation form the database.
12.
What is DBMS?
Collection of many programs to access data
Collection of interrelated data
Collection of commands
All
Hide
Wrong Answer
DBMS is collection of interrelated data.
13.
Rectangles in ER diagram represents?
Tables
Attributes
Tuples
Entity sets
Hide
Wrong Answer
The rectangle in ER diagram represents entity sets.
14.
Select the correct definition of relation.
Subset of a cartesian product of list of domains
Subset of a cartesian product of list of tuple
Subset of a cartesian product of list of attributes
Subset of a cartesian product of list of relations
Hide
Wrong Answer
Relation is subset of a cartesian product of list of domains.
15.
Which of the following allows to uniquely identify a tuple?
Schema
Attribute
Super key
Domain
Hide
Wrong Answer
Super Key helps us to uniquely identify a tuple in a relation.
16.
Which of the following is known as minimal super key?
Primary key
Candidate key
Foreign key
None
Hide
Wrong Answer
The candidate key is known as the minimal super key.
17.
Select the relational algebra operations.
Union
Select
Rename
All of the above
Hide
Wrong Answer
Union, select, rename are all relational algebra operations.
18.
Which is AS clause used for?
Rename
Selection
Join
Projection
Hide
Wrong Answer
AS clause is used for Rename
19.
How many levels are there in architecture of database?
2
3
4
5
Hide
Wrong Answer
There are three levels of architecture in database - physical level, view level and user level.
20.
Which data structure is used in Hierarchical model records?
Graph
Tree
Linked list
Stacks
Hide
Wrong Answer
Tree is used for representing Hierarchical model records.
21.
How is ER diagram represented?
Circle
Ellipse
Triangle
Square
Hide
Wrong Answer
Ellipse is used to represent ER diagram.
22.
A relational database developer refers to a record as?
Attribute
Tuple
Relation
None
Hide
Wrong Answer
Record is referred to as tuple.
23.
Which normal form deals with multivalued dependency?
1NF
2NF
3NF
4NF
Hide
Wrong Answer
The 4NF normal form deals with multivalued dependency.
24.
Which of the following is not a SQL command?
DELETE
ORDER BY
SELECT
WHERE
Hide
Wrong Answer
DELETE is not a SQL command.
25.
Identify the concurrency based protocol?
Lock based protocol
Two phase locking protocol
Timestamp ordering protocol
All
Hide
Wrong Answer
All of the above are concurrency based protocols.
26.
Select the correct foreign key constraint?
Referential integrity
Entity integrity
Domain integrity
None
Hide
Wrong Answer
Referential integrity is known as foreign key constraint.
27.
What is the name of the query that is placed within a WHERE or HAVING clause of another
query?
Multi query
Subquery
Super query
Master query
Hide
Wrong Answer
It is known as subquery.
28.
Which command is used to remove a stored function from the database?
DROP
DELETE
ERASE
REMOVE
Hide
Wrong Answer
The DROP command is used to remove a stored function from the database.
29.
After which operation is the modify operation done?
Look-up
Insert
Delete
All
Hide
Wrong Answer
Modify operation is used after Look-up.
30.
Which of the following command is used to change data in table?
INSERT
UPDATE
MERGE
NONE
Hide
Wrong Answer
The UPDATE command is used to change data in table.
31.
Which of the following normal forms contains information about a single entity?
1NF
2NF
3NF
4NF
Hide
Wrong Answer
The 4NF contains information about single entity. For each non-trivial multivalued
dependencies X->Y, X is a superkey.
32.
Which of the following can replace the below query?
SELECT name, course_id
FROM instructor, teaches
WHERE instructor_ID= teaches_ID;

Select name, course_id from instructor natural join teaches;


Select name,course_id from teaches,instructor where instructor_id=course_id;
Select name, course_id from instructor;
Select course_id from instructor join teaches;
Hide
Wrong Answer
Join can be used to join two tables with same attributes.
33.
Which of the following is the full form of NTFS?
New Tree File System
New Technology FIle System
New Table File System
Both B and C
Hide
Wrong Answer
The full form of NTFS is New Technology FIle System.
34.
What is the number of tuples of a relation known as?
Column
Cardinality
Entity
None
Hide
Wrong Answer
The number of tuples of a relation is known as cardinality.
35.
Select the correct definition of Relational calculus?
It is a high level language
It is a procedural language
It is a non-procedural language
It is a data definition language
Hide
Wrong Answer
The relational calculus is a type of non-procedural language. It simply describes what data
needs to be retrieved.
36.
Total view of a database is known as?
Physical view
Internal view
Conceptual view
External view
Hide
Wrong Answer
The conceptual view is referred to as the total view of a database.
37.
Select the definition of the correct key which is used to represent relation between two
tables?
Candidate key
Foreign key
Primary key
Super key
Hide
Wrong Answer
The foreign key is used to represent relation between two tables.
38.
Select the correct command to find the number of values in a column.
ADD
SUM
TOTAL
COUNT
Hide
Wrong Answer
COUNT is used to find the number of values in a column.
39.
Select the correct command to modify a column in a table.
Update
Alter
Drop
Set
Hide
Wrong Answer
The ALTER command is used to modify a column in a table.
40.
Select the correct properties of entities?
Table
Groups
Attributes
Switchboards
Hide
Wrong Answer
The attributes are a property of entities.
41.
Primary key can be?
NULL
NOT NULL
Both NULL and NOT NULL
Depends on situation
Hide
Wrong Answer
Primary key should always be NOT NULL.
42.
To select some particular columns, which of the following command is used?
PROJECTION
SELECTION
JOIN
UNION
Hide
Wrong Answer
To select some particular columns, projection is used.
43.
Select the correct database object which does not exist physically.
Base table
View
Index
None
Hide
Wrong Answer
View is a concept, hence it does not exist physically.
44.
NATURAL JOIN can also be termed as -
Combination of Union and cartesian product
Combination of Selection and cartesian product
Combination of Projection and cartesian product
None
Hide
Wrong Answer
NATURAL JOIN can also be termed as combination of Projection and cartesian product.
45.
Which of the following operator is used to compare a value to a list of literals values that
have been specified?
ANY
BETWEEN
IN
ALL
Hide
Wrong Answer
The BETWEEN operator is used to compare a value to a list of literals values that have been
specified
46.
Maximum children of a B-tree of order m?
m/2
m-1
m
m+1
Hide
Wrong Answer
The maximum number of children of B-tree of order m is m.
47.
What is a table joined with itself called?
Join
Self join
Outer join
Equi join
Hide
Wrong Answer
Table joined with self is known as Self Join
48.
What is the use of COUNT in SQL?
Returns number of distinct value
Returns total values
Returns number of groups
Returns number of columns
Hide
Wrong Answer
The COUNT is used to return the total values in SQL.
49.
Select the valid SQL type.
NUMERIC
CHARACTER
FLOAT
All of the above
Hide
Wrong Answer
All of the above are valid SQL types.
50.
Select the correct advantages of view.
Derived columns
Data security
Hiding of complex queries
All of the above
Hide
Wrong Answer
All the above are advantages of view.

Security and Ethical issues MCQs

An ethical hacker must ensure that proprietary information of the firm does not
get leaked.
A. True
B. False

After performing ____________ the ethical hacker should never disclose client
information to other parties.
A. hacking
B. cracking
C. penetration testing
D. exploiting

__________ is the branch of cybersecurity that deals with morality and


provides different theories and a principle regarding the viewpoints about what
is right and wrong.
A. Social ethics
B. Ethics in cyber-security
C. Corporate ethics
D. Ethics in black hat hacking

________ helps to classify arguments and situations, better understand a


cyber-crime and helps to determine appropriate actions.

A. Cyber-ethics
B. Social ethics
C. Cyber-bullying
D. Corporate behavior
A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
A. privacy and security
B. rules and regulations
C. hacking techniques
D. ethics to talk to seniors

Before performing any penetration test, through legal procedure, which key
points listed below is not mandatory?
A. Know the nature of the organization
B. Characteristics of work done in the firm
C. System and network
D. Type of broadband company used by the firm

The legal risks of ethical hacking include lawsuits due to __________ of


personal data.
A. stealing
B. disclosure
C. deleting
D. hacking

_____________ is the technique used in business organizations and firms to


protect IT assets.
A. Ethical hacking
B. Unethical hacking
C. Fixing bugs
D. Internal data-breach

Leaking your company data to the outside network without prior permission of
senior authority is a crime.
A. True
B. False

___________ has now evolved to be one of the most popular automated tools
for unethical hacking.
A. Automated apps
B. Database software
C. Malware
D. Worms

Performing a shoulder surfing in order to check other’s password is


____________ ethical practice.
A. a good
B. not so good
C. very good social engineering practice
D. a bad
What is the ethics behind training how to hack a system?
A. To think like hackers and know how to defend such attacks
B. To hack a system without the permission
C. To hack a network that is vulnerable
D. To corrupt software or service using malware

Which of the following is key characteristics of a hacker?


A. Afraid to say they don’t know the answer
B. Willing to find answers on their own.
C. Not willing to find answers on their own.
D. All of these

A program designed to destroy data on your computer which can travel to


“infect” other computers is called a:
A. disease
B. torpedo
C. hurricane
D. virus
E. infector

1. Which of the following deals with procedures, practices and values?


a. piracy
b. programs
c. virus
d. computer ethics

2. Commercial programs made available to the public illegally are known as


a. freeware
b. warez
c. free software
d. software

3. Which one of the following are self-repeating and do not require a


computer program to attach themselves?
a. viruses
b. worms
c. spyware
d. Trojans

4. Which one of the following tracks a user visits a website?


a. spyware
b. cookies
c. worms
d. Trojans

5. Which of the following is not a malicious program on computer systems?


a. worms
d. Trojans
c. spyware
d. cookies

6. A computer network security that monitors and controls incoming and


outgoing traffic is
a. Cookies
b.Virus
c. Firewall
d. worms

7. The process of converting cipher text to plain text is called


a. Encryption
b. Decryption
c. key
d. proxy server

8. e-commerce means
a. electronic commerce
b. electronic data exchange
c. electric data exchange
d. electronic commercialization.

9. Distributing unwanted e-mail to others is called.


a. scam
b. spam
c. fraud
d. spoofing

10. Legal recognition for transactions are carried out by


a. Electronic Data Interchange
b. Electronic Data Exchange
c. Electronic Data Transfer
d. Electrical Data Interchange

Cyber Security MCQ (Multiple Choice Questions) 1. What is


Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
View Answer
Answer: d
Explanation: Cyber Security provides security to a system against cyber-attacks by using
various technologies, and processes.
2. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
View Answer
Answer: a
Explanation: It protects internet-connected systems such as hardware, software, and
data from cyber-attacks. It aims to reduce cyber attacks against the system, network,
and technologies by reducing unauthorized exploitation, vulnerability, and threats.
3. Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
View Answer
Answer: a
Explanation: August Kerckhoffs, a linguist and German professor at HEC, wrote an
essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly
established the foundations for contemporary encryption, earning him the title of “Father
of Computer Security.”
4. Which of the following is defined as an attempt to steal, spy, damage or destroy
computer systems, networks, or their associated information?
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
View Answer
Answer: a
Explanation: An effort to steal, spy on, damage, or destroy diverse components of
cyberspace, such as computer systems, related peripherals, network systems, and
information, is known as a cyber attack.
5. Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
View Answer
Answer:d
Explanation: Since technology is improving, the threat and attacks against the
technology are also increasing. Hence, to provide security, it is divided into the following
types:
Cloud Security: Provides security for the data stored on the cloud.
Network Security: Protects the internal network from threats.
Application Security: Protects data stored in the application software.
advertisement
6. What are the features of cyber security?
a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above
View Answer
Answer: d
Explanation: The features are as follows:
Compliance: Creating a program that meets the requirements and rules of the users.
Defense against internal threats: Should provide security against internal exploitation.
Threat Prevention: Should be capable of detecting the threat and preventing them.
7. Which of the following is an objective of network security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
View Answer
Answer: d
Explanation: The objectives of network security are Confidentiality, Integrity, and
Availability.
Confidentiality: The function of confidentiality is to keep sensitive company information
safe from unwanted access. The confidentiality component of network security ensures
that data is only accessible to those who are authorized to see it.
Integrity: This goal entails ensuring and preserving data accuracy and consistency. The
purpose of integrity is to ensure that data is accurate and not tampered with by
unauthorized individuals.
Availability: The purpose of availability in Network Security is to ensure that data,
network resources, and services are always available to legitimate users, whenever they
need them.
8. Which of the following is not a cybercrime?
a) Denial of Service
b) Man in the Middle
c) Malware
d) AES
View Answer
Answer: d
Explanation: Denial of Service, Man in the Middle, and Malware exploit the system
causing a threat to security, hence they are considered as cybercrime. AES (Advanced
Encryption Standard) provides security by encrypting the data.
9. Which of the following is a component of cyber security?
a) Internet Of Things
b) AI
c) Database
d) Attacks
View Answer
Answer: a
Explanation: The Internet of Things (IoT) is a network of physical objects embedded with
sensors, software, and other technologies to connect and exchange data with other
devices and systems through the internet.
10. Which of the following is a type of cyber attack?
a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
View Answer
Answer: d
Explanation: Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to
the system.
SQL Injections: The attacker gains access to the protected information by adding
malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to
the confidential data.
11. Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses
View Answer
Answer: a
Explanation: The advantages are minimization of computer freezing and crashes, user
privacy, and protection against viruses, worms, etc. Disadvantages include the system
becoming slow, configuring firewalls correctly can be difficult, need to update the new
software in order to keep security up to date.
12. “Cyberspace” was coined by _________
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
View Answer
Answer: b
Explanation: William Gibson, an American-Canadian fiction pioneer, and coiner,
examined the many streams of technology and invented the word “cyberspace” in 1821.
The phrase refers to linked technologies that aid in information exchange, interaction
with digital devices, storage and digital entertainment, computer and network security,
and other information technology-related matters.
13. In which year has hacking become a practical crime and a matter of concern in the
field of cyber technology?
a) 1991
b) 1983
c) 1970
d) 1964
View Answer
Answer: c
Explanation: In the case of hackers in the 1970s, hackers and cyber thieves found out
how wired technologies operate and how they might be abused to obtain a competitive
edge or misuse the technology.
14. Governments hired some highly skilled hackers for providing cyber security for the
country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
View Answer
Answer: a
Explanation: Nation / State-sponsored hackers are those who are engaged or paid by a
nation’s or state’s government to safeguard the country from cyber terrorists and other
groups or individuals, as well as to expose their plans, communications, and activities.
15. Which of the following act violates cyber security?
a) Exploit
b) Attack
c) Threat
d) Vulnerability
View Answer
Answer: b
Explanation: A threat is a possible danger that might lead to a security breach and cause
harm to the system or network. Vulnerability is a word that refers to a flaw in a network
or system that might be exploited by an attacker. Exploiting a security flaw might result in
unexpected and unwanted effects. A cyber-attack is an attempt by attackers to alter,
delete, steal or expose any specific data by gaining unauthorized access.
16. Which of the following actions compromise cyber security?
a) Vulnerability
b) Attack
c) Threat
d) Exploit
View Answer
Answer: c
Explanation: A threat is defined as a potential hazard that might result in a breach of
security and cause harm to the system or network. Vulnerability is a term that refers to a
weakness in a network or system that an attacker may exploit. Exploiting a weakness in
security might have unintended and undesirable consequences.
17. Which of the following is the hacking approach where cyber-criminals design fake
websites or pages for tricking or gaining additional traffic?
a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming
View Answer
Answer: a
Explanation: Pharming is a strategy and approach used by cybercriminals to create
phony web pages and sites in order to mislead users into giving over personal
information such as login IDs and passwords.
18. Which of the following is not a type of peer-to-peer cyber-crime?
a) MiTM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing
View Answer
Answer: c
Explanation: Peer-to-peer includes phishing, as well as the distribution of Trojans and
worms to individuals. The leakage of a huge number of people’s credit card data on the
deep web, on the other hand, is classified as a computer-as-weapon cyber-crime.
19. A cyber-criminal or penetration tester uses the additional data that stores certain
special instructions in the memory for activities to break the system in which of the
following attack?
a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM
View Answer
Answer: b
Explanation: The excess data that contains certain specific instructions in the memory
for actions are projected by a cyber-criminal or penetration tester to break the system in
a buffer-overflow attack.
20. Which of the following do Cyber attackers commonly target for fetching IP address of
a target or victim user?
a) ip tracker
b) emails
c) websites
d) web pages
View Answer
Answer: c
Explanation: Enumeration by cyber-attackers is also feasible via websites since
attackers target websites in order to obtain the victim’s or target user’s IP address.
21. Which of the following is defined as an attempt to harm, damage or cause threat to a
system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
View Answer
Answer: d
Explanation: Extortion, identity theft, email hacking, digital surveillance, stealing
hardware, mobile hacking, and physical security breaches are all examples of cyber
assaults or activities.
22. They are nefarious hackers, and their main motive is to gain financial profit by doing
cyber crimes. Who are “they” referred to here?
a) White Hat Hackers
b) Black Hat Hackers
c) Hactivists
d) Gray Hat Hackers
View Answer
Answer: b
Explanation: Black Hat hackers, often known as “crackers,” are a sort of cyber crime that
gain illegal access to a user’s account or system in order to steal confidential data or
introduce malware into the system for personal gain or to harm the company.
23. IT security in any firm or organization is maintained and handled by
____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
View Answer
Answer: d
Explanation: This is a position in a company or organisation where an individual
develops and maintains different systems and security tools for the company or
organisation to which he or she belongs.
24. Where did the term “hacker” originate?
a) MIT
b) New York University
c) Harvard University
d) Bell’s Lab
View Answer
Answer: a
Explanation: The term “hacker” was coined at MIT (Massachusetts Institute of
Technology) because individuals and highly competent professionals use computer
languages to address various challenges. In this context, labels such as geeks and
nerds have been coined.
25. What is the existence of weakness in a system or network is known as?
a) Attack
b) Exploit
c) Vulnerability
d) Threat
View Answer
Answer: c
Explanation: Vulnerability is a term that refers to a weakness in a network or system that
an attacker may exploit. Exploiting a weakness in security might have unintended and
undesirable consequences.
26. Which of the following is an internet scam done by cyber-criminals where the user is
convinced digitally to provide confidential information.
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack
View Answer
Answer: b
Explanation: Phishing is a type of cybercrime in which a person is digitally persuaded to
disclose private information. Phishing comes in a variety of forms. Some of them employ
malware and emails to divert users to various websites.
27. Which of the following is not a step followed by cyber-criminals in data breaching?
a) Exfiltration
b) Research and info-gathering
c) Attack the system
d) Fixing the bugs
View Answer
Answer: d
Explanation: During a hack, cyber-criminals first do research on the target, gathering
data about the victim’s system and network. Then go ahead and attack. Once the
attacker has gained access, he or she takes sensitive information.
28. Which of the following online service’s privacy cannot be protected using Tor?
a) Browsing data
b) Instant messaging
c) Login using ID
d) Relay chats
View Answer
Answer: c
Explanation: Login using ID will obviously take your ID in order to access your account
and is not the headache of Tor. Privacy regarding instant messaging, browsing data,
relay chats are some of the following online services protected by Tor.
29. Which of the following term refers to a group of hackers who are both white and
black hat?
a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers
View Answer
Answer: b
Explanation: Grey Hat Hackers are a hybrid of ethical and unethical hacker personalities.
They hack other people’s computers for fun, but they don’t hurt them, and they exploit
network faults and vulnerabilities without the admin or owner’s awareness.
30. Which of the following is not an email-related hacking tool?
a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc
View Answer
Answer: d
Explanation: Sendinc is not a tool that compromises email data. It is used to protect
business email accounts and provides a fast web-based solution for businesses to start
delivering secure emails. The other three are email hacking tools.
30. Which of the following DDoS in mobile systems wait for the owner to trigger the
cyber attack?
a) botnets
b) programs
c) virus
d) worms
View Answer
Answer: a
Explanation: Botnets on infected mobile devices are waiting for orders from their owners.
It starts a DDoS flood attack after receiving the owner’s instructions. As a result, calls
are not connected or data is not sent.
31. Which of the following is the least strong security encryption standard?
a) WPA3
b) WPA2
c) WPA
d) WEP
View Answer
Answer: d
Explanation: Wireless security is an important aspect of cyber-security. Wired Equivalent
Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2, and WPA3 are the most
common kinds of wireless security. WEP is a famously insecure encryption protocol.
32. Which of the following is a Stuxnet?
a) Trojan
b) Antivirus
c) Worm
d) Virus
View Answer
Answer: c
Explanation: Stuxnet is a popular and powerful worm that came into existence in mid
2010, which was very powerful as it was accountable for the cause of huge damage to
Iran’s Nuclear program. It mainly targets the PLCs (Programmable Logic Controllers) in
a system.
33. Which of the following ethical hacking technique is used for determining which
operating system (OS) is running on a remote computer?
a) Operating System fingerprinting
b) Operating System penetration testing
c) Digital-printing
d) Machine printing
View Answer
Answer: a
Explanation: OS fingerprinting is an ethical hacking technique used for determining what
operating system (OS) is running on a remote computer. OS Fingerprinting is the
practice of examining data packets that come from a network in order to extract
intelligence that may be utilized in future assaults.
34. Which of the following can diminish the chance of data leakage?
a) Steganography
b) Chorography
c) Cryptography
d) Authentication
View Answer
Answer: a
Explanation: Ordinary files are targeted by hackers or other cyber criminals in order to
disguise distinct data or information within another data file. You can reduce the risk of
data leaking by employing steganography.

1. What is computer architecture?


a) set of categories and methods that specify the functioning, organisation, and
implementation of computer systems
b) set of principles and methods that specify the functioning, organisation, and
implementation of computer systems
c) set of functions and methods that specify the functioning, organisation, and
implementation of computer systems
d) None of the mentioned
View Answer
Answer: b
Explanation: A set of principles and methods that specify the functioning, organisation,
and implementation of computer systems is known as computer architecture. A system’s
architecture refers to its structure in terms of the system’s individually specified
components and their interrelationships.
2. What is computer organization?
a) structure and behaviour of a computer system as observed by the user
b) structure of a computer system as observed by the developer
c) structure and behaviour of a computer system as observed by the developer
d) All of the mentioned
View Answer
Answer: a
Explanation: The structure and behaviour of a computer system as observed by the user
is the subject of computer organisation.
3. Which of the following is a type of computer architecture?
a) Microarchitecture
b) Harvard Architecture
c) Von-Neumann Architecture
d) All of the mentioned
View Answer
Answer: d
Explanation: Below are the types of Computer Architecture:
i) Von-Neumann Architecture
ii) Harvard Architecture
iii) Instruction Set Architecture
iv) Microarchitecture
v) System Design
4. Which of the following is a type of architecture used in the computers nowadays?
a) Microarchitecture
b) Harvard Architecture
c) Von-Neumann Architecture
d) System Design
View Answer
Answer: c
Explanation: John von Neumann proposed this architecture. The architecture of today’s
computers is based on von Neumann architecture. It is based on a few ideas.
5. Which of the following is the subcategories of computer architecture?
a) Microarchitecture
b) Instruction set architecture
c) Systems design
d) All of the mentioned
View Answer
Answer: a
Explanation: The three main subcategories of computer architecture are:
i) Microarchitecture
ii) Instruction set architecture
iii) Systems design
advertisement
6. Which of the architecture is power efficient?
a) RISC
b) ISA
c) IANA
d) CISC
View Answer
Answer: a
Explanation: Hence the RISC architecture is followed in the design of mobile devices.
7. What does CSA stands for?
a) Computer Service Architecture
b) Computer Speed Addition
c) Carry Save Addition
d) None of the mentioned
View Answer
Answer: b
Explanation: The CSA is used to speed up the addition of multiplicands.
8. If an exception is raised and the succeeding instructions are executed completely,
then the processor is said to have ______
a) Generation word
b) Exception handling
c) Imprecise exceptions
d) None of the mentioned
View Answer
Answer: c
Explanation: The processor since as executed the following instructions even though an
exception was raised, hence the exception is treated as imprecise.
9. To reduce the memory access time we generally make use of ______
a) SDRAM’s
b) Heaps
c) Cache’s
d) Higher capacity RAM’s
View Answer
Answer: c
Explanation: The time required to access a part of the memory for data retrieval.
10. The IA-32 system follows which of the following design?
a) CISC
b) SIMD
c) RISC
d) None of the mentioned
View Answer
Answer: a
Explanation: This system architecture is used to reduce the steps involved in execution
by performing complex operations in one step.
11. Which of the following architecture is suitable for a wide range of data types?
a) IA-32
b) ARM
c) ASUS firebird
d) 68000
View Answer
Answer: a
Explanation: IA-32 architecture is suitable for a wide range of data types.
12. In IA-32 architecture along with the general flags, which of the following conditional
flags are provided?
a) TF
b) IOPL
c) IF
d) All of the mentioned
View Answer
Answer: d
Explanation: These flags are basically used to check the system for exceptions.
13. The VLIW architecture follows _____ approach to achieve parallelism.
a) SISD
b) MIMD
c) MISD
d) SIMD
View Answer
Answer: b
Explanation: The MIMD stands for Multiple Instructions Multiple Data.
14. What does VLIW stands for?
a) Very Long Instruction Width
b) Very Large Instruction Word
c) Very Long Instruction Width
d) Very Long Instruction Word
View Answer
Answer: d
Explanation: It is the architecture designed to perform multiple operations in parallel.
15. In CISC architecture most of the complex instructions are stored in _____
a) CMOS
b) Register
c) Transistors
d) Diodes
View Answer
Answer: c
Explanation: In CISC architecture more emphasis is given on the instruction set and the
instructions take over a cycle to complete.
16. Both the CISC and RISC architectures have been developed to reduce the ______
a) Time delay
b) Semantic gap
c) Cost
d) All of the mentioned
View Answer
Answer: b
Explanation: The semantic gap is the gap between the high level language and the low
level language.
17. ________ are the different type/s of generating control signals.
a) Hardwired
b) Micro-instruction
c) Micro-programmed
d) Both Micro-programmed and Hardwired
View Answer
Answer: d
Explanation: The above is used to generate control signals in different types of system
architectures.
18. If the instruction Add R1, R2, R3 is executed in a system which is pipelined, then the
value of S is (Where S is term of the Basic performance equation).
a) 2
b) ~1
c) ~7
d) 2
View Answer
Answer: b
Explanation: The value will be much lower in case of multiple BUS organisation.
19. The small extremely fast, RAM’s all called as ________
a) Heaps
b) Accumulators
c) Stacks
d) Cache
View Answer
Answer: a
Explanation: Cache’s are extremely essential in single BUS organisation to achieve fast
operation.
20. For a given FINITE number of instructions to be executed, which architecture of the
processor provides for a faster execution?
a) ANSA
b) Super-scalar
c) ISA
d) All of the mentioned
View Answer
Answer: b
Explanation: In super-scalar architecture, the instructions are set in groups and they’re
decoded and executed together reducing the amount of time required to process them.
21. What is the full form of ISA?
a) Industry Standard Architecture
b) International Standard Architecture
c) International American Standard
d) None of the mentioned
View Answer
Answer: c
Explanation: The ISA is an architectural standard developed by IBM for its PC’s.
22. Which of the following is the fullform of CISC?
a) Complex Instruction Sequential Compilation
b) Complete Instruction Sequential Compilation
c) Computer Integrated Sequential Compiler
d) Complex Instruction Set Computer
View Answer
Answer: d
Explanation: The CISC machines are well adept at handling multiple BUS organisation.
23. The reason for the cells to lose their state over time is ________
a) Use of Shift registers
b) The lower voltage levels
c) Usage of capacitors to store the charge
d) None of the mentioned
View Answer
Answer: c
Explanation: Since capacitors are used the charge dissipates over time.
24. In order to read multiple bytes of a row at the same time, we make use of ______
a) Memory extension
b) Cache
c) Shift register
d) Latch
View Answer
Answer: d
Explanation: The latch makes it easy to ready multiple bytes of data of the same row
simultaneously by just giving the consecutive column address.
25. The difference in the address and data connection between DRAM’s and SDRAM’s
is _______
a) The requirement of more address lines in SDRAM’s
b) The usage of a buffer in SDRAM’s
c) The usage of more number of pins in SDRAM’s
d) None of the mentioned
View Answer
Answer: b
Explanation: The SDRAM uses buffered storage of address and data.
26. The chip can be disabled or cut off from an external connection using ______
a) ACPT
b) RESET
c) LOCK
d) Chip select
View Answer
Answer: d
Explanation: The chip gets enabled if the CS is set otherwise the chip gets disabled.
27. The controller multiplexes the addresses after getting the _____ signal.
a) INTR
b) ACK
c) RESET
d) Request
View Answer
Answer: d
Explanation: The controller gets the request from the device needing the memory read
or write operation and then it multiplexes the address.
28. The data is transferred over the RAMBUS as _______
a) Blocks
b) Swing voltages
c) Bits
d) Packets
View Answer
Answer: b
Explanation: By using voltage swings to transfer data, the transfer rate along with
efficiency is improved.
29. The memory devices which are similar to EEPROM but differ in the cost
effectiveness is ______
a) CMOS
b) Memory sticks
c) Blue-ray devices
d) Flash memory
View Answer
Answer: d
Explanation: The flash memory functions similar to the EEPROM but is much cheaper.
30. The flash memory modules designed to replace the functioning of a hard disk is
______
a) RIMM
b) FIMM
c) Flash drives
d) DIMM
View Answer
Answer: c
Explanation: The flash drives have been developed to provide faster operation but with
lesser space.
31. The drawback of building a large memory with DRAM is ______________
a) The Slow speed of operation
b) The large cost factor
c) The inefficient memory organisation
d) All of the mentioned
View Answer
Answer: a
Explanation: The DRAM’s were used for large memory modules for a long time until a
substitute was found.
32. In a 4M-bit chip organisation has a total of 19 external connections, then it has
_______ address if 8 data lines are there.
a) 2
b) 5
c) 9
d) 8
View Answer
Answer: c
Explanation: To have 8 data lines and 19 external connections it has to have 9 address
lines(i.e 512 x 8 organisation).
33. What does ISO stands for?
a) International Software Organisation
b) Industrial Software Organisation
c) International Standards Organisation
d) Industrial Standards Organisation
View Answer
Answer: c
Explanation: The ISO is yet another architectural standard, used to design systems.
34. The bit used to signify that the cache location is updated is ________
a) Flag bit
b) Reference bit
c) Update bit
d) Dirty bit
View Answer
Answer: d
Explanation: When the cache location is updated in order to signal to the processor this
bit is used.
35. During a write operation if the required block is not present in the cache then ______
occurs.
a) Write miss
b) Write latency
c) Write hit
d) Write delay
View Answer
Answer: a
Explanation: This indicates that the operation has missed and it brings the required block
into the cache.
36. While using the direct mapping technique, in a 16 bit system the higher order 5 bits
are used for ________
a) Id
b) Word
c) Tag
d) Block
View Answer
Answer: c
Explanation: The tag is used to identify the block mapped onto one particular cache
block.
37. The bit used to indicate whether the block was recently used or not is _______
a) Reference bit
b) Dirty bit
c) Control bit
d) Idol bit
View Answer
Answer: b
Explanation: The dirty bit is used to show that the block was recently modified and for a
replacement algorithm.
38. The number successful accesses to memory stated as a fraction is called as _____
a) Access rate
b) Success rate
c) Hit rate
d) Miss rate
View Answer
Answer: c
Explanation: The hit rate is an important factor in performance measurement.

You might also like