0% found this document useful (0 votes)
41 views11 pages

Final SP23 - 3

The document contains 60 multiple choice questions related to computer science topics such as operating systems, computer architecture, algorithms, databases, cryptography, and networking. The questions cover concepts like CPU registers, IPv4 addressing, HTTP protocol, processes, multiprogramming, data types held in registers, binary search, and more.

Uploaded by

Thuc Vo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views11 pages

Final SP23 - 3

The document contains 60 multiple choice questions related to computer science topics such as operating systems, computer architecture, algorithms, databases, cryptography, and networking. The questions cover concepts like CPU registers, IPv4 addressing, HTTP protocol, processes, multiprogramming, data types held in registers, binary search, and more.

Uploaded by

Thuc Vo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

1.

The ______deals with active objects instead of passive objects

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

2. The format of an IPv4 address is referred to as______

A. Dotted-binary notation

B. Dotted-octal notation

C. Dotted-decimal notation

D. Dotted-hexadecimal notation

3. A register in a CPU can hold_____

A. Only data

B. Only instructions

C. Only program counter values

D. Data, instruction, or program counter values

4. The _____is a protocol that is used to define how the client-server programs can be written
pages from the Web.

A. FTP

B. SMTP

C. TELNET

D. HTTP

5. A program becomes a______ from the moment it is selected for execution until it has finished
becomes a program again.

A. Program

B. Job

C. Process

D. Task

6. In______ more than one program is in memory at the same time and they are executed concl
CPU switching rapidly between the programs

A. Monoprogramming

B. Multiprogramming

C. Microprogramming
D. Operating system

7. A billionth of a second is defined as a:

A. Millisecond

B. Microsecond

C. Nanosecond

D. Picoseconds

E. None of the others

8. Which is another name for functional language?

A. Machine

B. Application language

C. Low-level language

D. High-level language

E. None of the others

9. The role of the physical layer is to transfer the bits received from the data-link layer and
conv_____for transmission.

A. Analog signals

B. Electromagnetic signals

C. Digital signals

D. Electronic signals

10. There are several methods for handling address collisions and each of them________ of the
has

A. Independent

B. Dependent

C. Based on

D. Related

11. ______ is an ordered set of unambiguous steps that produces a result and terminates in a finite
time.

A. A construct

B. A recursion

C. An iteration

D. An algorithm
12. In a three-level DBMS architecture, the layer that interacts directly with the hardware is
the______ level.

A. External

B. Conceptual

C. Internal

D. Physical

13. Which of the following is taking the one's complement of of the integer 00110110?

A. 11001100

B. 11001111

C. 11001001

D. 11100110

14. A______uses the principle of logical reasoning to answer queries. It is based on formal logic
defined by Greek mathematicians and later developed into firstorder predicate calculus

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

15. In the data link layer, a Bluetooth LAN is a (an)____ _network

A. Wired WANs

B. Ad hoc

C. Dial-up service

D. Extended Service Set

16.______ is the breaking up of a large project into smaller parts.

A. Coupling

B. Incrementing

C. Obsolescence

D. Modularization

17. The ability of a computer system to remain operational despite various failures is

A. Relation

B. Schema

C. Resilience

D. Versatility
E. None of the others

18. Any device that performs signal conversion is

A. Modulator

B. Modem

C. Keyboard

D. Plotter

E. None of the others

19. Defining the users, requirements, and methods is part of the______phase.

A. Analysis

B. Design

C. Implementation

D. Testing

20. In a________the project team needs to choose a language or a set of languages from among
the procedural languages

A. Analysis phase

B. Design phase

C. Implementation phase

D. Testing phase

21._________ can be threatened by security attacks.

A. Confidentiality, cryptography, nonrepudiation

B. Confidentiality, encryption, decryption

C. Confidentiality, integrity, availability

D. Confidentiality, denial of service, masquerading

22. _______protocol (s) is one of the protocols in the transport layer.

A. Only TCP

B. Only UDP

C. Only SCTP

D. TCP, UDP, and SCTP

23. Static RAM (SRAM) technology uses______ The gates hold their state 0 or 1.

A. Ultraviolet light

B. Electronic impulses
C. Capacitors

D. Flip-flop gates

24. To search for elements, we can use_____ on sorted arrays that can help to decrease time
complexity

A. Sequential search

B. Insertion sort

C. Selection sort

D. Binary search

25. C language is a(n)____ language.

A. Procedural

B. Functional

C. Declarative

D. Object-oriented

26. _______is a unit that can add two inputs.

A. An ALU

B. A register

C. A control unit

D. A tape drive

27. The number of bits per sample is sometimes referred to as the____

A. Quantization

B. Sampling rate

C. Encoding

D. Bit depth

28. The maximum value of an octal integer with K=2 digits is Nmax =_____?

A. 63

B. 64

C. 65

D. 66

E. None of the others

29. A company's product or service is identified as a______

A. Trade mark
B. Trade secret

C. Patent

D. Copyright

30. Which of the following representations is erroneous?

A. (10211)2

B. (342)8

C. (EEE)16

D. 145

31. What is method in black-box testing which tests are designed to include representatives of
boundary values in a range?

A. Boundary-value testing

B. Random testing

C. Exhaustive testing

D. Data flow testing

32._______ is a basic algorithm that adds a list of numbers.

A. Summation

B. Product

C. Smallest

D. Largest

33. A system program which helps the execution of user programs is known as

A. System software

B. Application program

C. Batch operating system

D. Utilities

E. None of the others

34. In the hierarchical database model, data is organized as an inverted______

A. Graph

B. Tree

C. Array

D. Record

35.______ can be measured by such metrics as mean time between failures number of bugs per
thousand lines of code and number of user requests for change.
A. Accuracy

B. Security

C. Efficiency

D. Correctability

36. In_____sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-
one swapping.

A. Selection

B. Bubble

C. Insertion

D. Every

37. _______is an attack that reduce the capability of a computer system to function correctly or
bring the system down altogether by exhausting its resources.

A. DoS

B. Trojan horses

C. Worms

D. Viruses

38. Why OS is responsible for the efficient use of input/output devices?

A. Because need to maintains a queue for each input/output device

B. Because these devices are slower in speed compared with the CPU and memory

C. It may use FIFO for one device

D. The manager also needs to know when a device has finished serving one process

39. Use a simple right shift operation on the bit pattern 1001 1000.

A. 1001 1001

B. 1001 1000

C. 0100 1101

D. 0100 1100

40. The operation that takes two relations and combines them based on common attributes is
the______operation.

A. Join

B. Project

C. Union

D. Intersection
41. In a positional number system with base b, we can always find the number of digits of an
integer. So how many digits can we find in the decimal number 234 in decimal?

A. 1

B. 2

C.3

D.4

42. Which component is not an operating system component?

A. File access management program

B. Device driver program

C. Program scheduler for process

D. Free memory management program

43. _____ is the process by which a given set of relations are transformed to a new set of relations
with a more solid structure.

A. Relational database

B. Database system

C. Atomic operations

D. Normalization

44. Each row in a relation is called______

A. An attribute

B. A tuple

C. A union

D. An attitude

45. If the ASCII code for E is 1000101, then the ASCII code for e is_____ Answer the question
without consulting the ASCII table.

A. 1000110

B. 1000111

C. 0000110

D. 1100101

46. The push operation______ of the stack.

A. Deletes an item from the top

B. Deletes an item from the bottom

C. Inserts an item at the top


D. Inserts an item at the bottom

47. We use the_____ search for an ordered list.

A. Sequential

B. Binary

C. Bubble

D. Insertion

48. An______ is a sequence of operands and operators that reduces to a single value

A. Expression

B. Operator

C. Variables

D. Input/output

49. _______ is a series of randomized letters and numbers which humans cannot make any sense
of.

A. Plain text

B. Cipher text

C. Encryption

D. Decryption

50. A____ is a collection of related elements possibly of different types having a single name

A. Array

B. Record

C. Linked list

D. Tree

51. In_____ cryptography, everyone has access to everyone's public key.

A. Symmetric-key

B. Asymmetric-key

C. Secret-key

D. Private-key

52. In_____the program can be divided into equally sized sections called pages, but the pages need
not be in memory at the same time for execution.

A. Partitioning

B. Paging

C. Demand paging
D. Demand segmentation

53. In a______the relationship between a character in the plaintext to a character in the ciphertext
is one-to-many

A. Monoalphabetic cipher

B. Substitution cipher

C. Polyalphabetic cipher

D. Transposition cipher

54. Use a circular right shift operation on the bit pattern 1001 1000

A. 0100 1100

B. 0011 0001

C. 1001 1001

D. 1001 1000

55. Which type of computers use the 8 bit code called EBCDIC?

A. Minicomputers

B. Microcomputers

C. Mainframe computers

D. Supercomputers

E. None of the others

56. A hashed file uses a_____ to accomplish this mapping.

A. Retrived file

B. Sequential access

C. Random access

D. Mathematical function

57. Who is considered the 'father' of the minicomputer and one of the founder fathers of the
modern computer industry world-wide?

A. George Tate

B. Kenneth H. Olsen

C. Seymour Cray

D. Basic Pascal

E. None of the others

58. In_______edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x, y),
x is called the starting point and y is called the endpoint of the edge.
A. Directed graph

B. Undirected graph

C. Edges

D. Arcs

59. The attack that reduces the capability of a computer is called a_____ attack.

A. Penetration

B. Denial of service

C. Either a or b

D. Neither a nor b

60. How can we set name of nodes in a linked list?

A. Depend on user

B. Name of the pointer

C. Implicit ones

D. Name of the head pointer

You might also like