Final SP23 - 3
Final SP23 - 3
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation
A. Only data
B. Only instructions
4. The _____is a protocol that is used to define how the client-server programs can be written
pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
5. A program becomes a______ from the moment it is selected for execution until it has finished
becomes a program again.
A. Program
B. Job
C. Process
D. Task
6. In______ more than one program is in memory at the same time and they are executed concl
CPU switching rapidly between the programs
A. Monoprogramming
B. Multiprogramming
C. Microprogramming
D. Operating system
A. Millisecond
B. Microsecond
C. Nanosecond
D. Picoseconds
A. Machine
B. Application language
C. Low-level language
D. High-level language
9. The role of the physical layer is to transfer the bits received from the data-link layer and
conv_____for transmission.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
10. There are several methods for handling address collisions and each of them________ of the
has
A. Independent
B. Dependent
C. Based on
D. Related
11. ______ is an ordered set of unambiguous steps that produces a result and terminates in a finite
time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
12. In a three-level DBMS architecture, the layer that interacts directly with the hardware is
the______ level.
A. External
B. Conceptual
C. Internal
D. Physical
13. Which of the following is taking the one's complement of of the integer 00110110?
A. 11001100
B. 11001111
C. 11001001
D. 11100110
14. A______uses the principle of logical reasoning to answer queries. It is based on formal logic
defined by Greek mathematicians and later developed into firstorder predicate calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
A. Wired WANs
B. Ad hoc
C. Dial-up service
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
17. The ability of a computer system to remain operational despite various failures is
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
A. Modulator
B. Modem
C. Keyboard
D. Plotter
A. Analysis
B. Design
C. Implementation
D. Testing
20. In a________the project team needs to choose a language or a set of languages from among
the procedural languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
A. Only TCP
B. Only UDP
C. Only SCTP
23. Static RAM (SRAM) technology uses______ The gates hold their state 0 or 1.
A. Ultraviolet light
B. Electronic impulses
C. Capacitors
D. Flip-flop gates
24. To search for elements, we can use_____ on sorted arrays that can help to decrease time
complexity
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
A. An ALU
B. A register
C. A control unit
D. A tape drive
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28. The maximum value of an octal integer with K=2 digits is Nmax =_____?
A. 63
B. 64
C. 65
D. 66
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
31. What is method in black-box testing which tests are designed to include representatives of
boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
A. Summation
B. Product
C. Smallest
D. Largest
33. A system program which helps the execution of user programs is known as
A. System software
B. Application program
D. Utilities
A. Graph
B. Tree
C. Array
D. Record
35.______ can be measured by such metrics as mean time between failures number of bugs per
thousand lines of code and number of user requests for change.
A. Accuracy
B. Security
C. Efficiency
D. Correctability
36. In_____sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-
one swapping.
A. Selection
B. Bubble
C. Insertion
D. Every
37. _______is an attack that reduce the capability of a computer system to function correctly or
bring the system down altogether by exhausting its resources.
A. DoS
B. Trojan horses
C. Worms
D. Viruses
B. Because these devices are slower in speed compared with the CPU and memory
D. The manager also needs to know when a device has finished serving one process
39. Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
40. The operation that takes two relations and combines them based on common attributes is
the______operation.
A. Join
B. Project
C. Union
D. Intersection
41. In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 234 in decimal?
A. 1
B. 2
C.3
D.4
43. _____ is the process by which a given set of relations are transformed to a new set of relations
with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
A. An attribute
B. A tuple
C. A union
D. An attitude
45. If the ASCII code for E is 1000101, then the ASCII code for e is_____ Answer the question
without consulting the ASCII table.
A. 1000110
B. 1000111
C. 0000110
D. 1100101
A. Sequential
B. Binary
C. Bubble
D. Insertion
48. An______ is a sequence of operands and operators that reduces to a single value
A. Expression
B. Operator
C. Variables
D. Input/output
49. _______ is a series of randomized letters and numbers which humans cannot make any sense
of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
50. A____ is a collection of related elements possibly of different types having a single name
A. Array
B. Record
C. Linked list
D. Tree
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52. In_____the program can be divided into equally sized sections called pages, but the pages need
not be in memory at the same time for execution.
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
53. In a______the relationship between a character in the plaintext to a character in the ciphertext
is one-to-many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
54. Use a circular right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000
55. Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function
57. Who is considered the 'father' of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
58. In_______edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x, y),
x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
59. The attack that reduces the capability of a computer is called a_____ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
A. Depend on user
C. Implicit ones