Final Fall 2022
Final Fall 2022
1. What is returned from an output device when it retrieves the bit string 00101011 stored in the
unsigned integer?
A. -43
B. 53
C. 43
D. -53
2. In the attacks threaten the confidentiality of information ___ refers to unauthorized access of
data?
A. Denial of service
B. Traffic analysis
C. Snooping
D. Repudiation
3. An index register that is automatically incremented or decremented with each use is
A. None of the others
B. Assembler
C. Asynchronous
D. Auto index
E. Compiler
4. Inside the ADT are two different parts of the model that are __ and __.
A. Application program and public operations
B. Data structure and application program
C. Application program and private operations
D. Data structure and operations
5. An IPv4 address is a ____ address the uniquely and universally defines the connection of to the
internet
A. 32 bit
B. None of others
C. 128-bit
D. 64-bit
6. A word can be ____ bits
A Only 32
B. Only 8
C. 8, or 16, or 32
D. only 16
7. A step-by-step solution to a problem is called ____
A. Hardware
B. An algorithm
C. An operation system
D. A computer language
8. What is the analysis process in the system implementation phase that will use a program as that
manipulates passive object ?
A. Classical analysis
B. All of others
C. Structured analysis
D. Procedure-oriented analysis
9. The smallest storage area on a magnetic disk that can ba accessed at one time is a ___
A. Sector
B. Head
C. Track
D. Frame
10. What is language of procedural paradigm that is high level language and also has some lower
level language.
A. Pascal
B. C
C. Ada
D. COBOL
11. In ____ more than one program is in memory of the some time and they are executed concert
CPU switching rapidly between the programs
A. Operating system
B. Monoprogramming
C. Multiprogramming
D. Microprogramming
12. All the members of a record must be ____
A Character type
B. Related types
C. The same types
D. Integer type
13. We use our ___ when we first log into the system. This contains any files we create while in
contain personal system files
A. Home directory
B. Root directory
C. Working directory
D. Parent directory
14. _________ means that the sender and the receiver expect confidentiality
A. Authentication
B. Integrity
C. Encryption and decryption
D. Nonrepudiation
15. ______ is a program that facilitates the execution of other program
A. A queue
B. An operating
C. An application
D. Hardware
16. ____ were designed in the 1950s to control mainframe computers.
A. Time-sharing systems
B. Parallel systems
C. Batch operating systems
D. Personal systems
17. ______ is the breaking up of a large project into smaller parts
A Obsolescence
B. Modularization
C. Incrementing
D. Coupling
18. In a block cipher a ____ is used to encrypt the whole block even if the key is made of multiple
A Single key
B. Auto key
C. Key stream
D. Key block
19. The base of binary number system is ___
A. 2
B. 16
C. 10
D. 8
20. C++ and C# language are a(n) ____ language
A. Declarative
B. Procedural
C. Object-oriented
D. Functional
21. Text is composed of countable entities ( characters) . we can count the number of charactera
example of ___ data
A analog
B. digital
C. bit pattern
D. binary
22. Each row in a relation is called ___
A. A tuple
B. An attribute
C. An attitude
D. A union
23. A ____ is a nonactive set of instructions stored on disk (or tape). It may or may not become a
job.
A. Task
B. Process
C. Program
D. Job
24. What is the order of Postorder traversal in Binary tree?
A. Right tree. Root tree. Left tree
B. Left tree, Right tree. Root tree
C. Left tree, Root tree. Right tree
D. Root tree, Right tree. Left tree
25. A(n) ___ is a suitable structure when a small number of insertions and deletions are required
searching and retrieval is needed.
A. Array
B. Linked list
C. Tree
D. Record
26. Which technique is used in multiprogramming that needs to be determined size beforehand t
manager and with each program occupyinga contiguous space?
A. Paging
B. Partitioning
C. Demand segmentation
D. Demand poging
27. Sending a virus to a computer is called an ___ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
28. In _______ sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. selection
B. bubble
C. insertion
D. every
29. A database management system (DBMS) is a combination of ___ components.
A. 3
B. 4
C. 5
D. 2
30. A company's product or service is identified as a ____.
A. Trade secret
B. Copyright
C. Trade mark
D. Patent
31. In the _______ graphic method of representing an image in a computer, each pixel is assigned a
bit patterns.
A. bitmap
B. vector
C. quantized
D. binary
32. A number which is stored and processed but not in the standard exponential form is called ___
A. Fixed point number
B. Octal number
C. Decimal number
D. Floating point number
E. None of the others
33. In storing video, what video can representation of information that changes in time?
A. Single image
B. A series of image
C. Frames
D. Frame of bit
E. None of the others
34. The TCP/IP suite does not define any protocol in ____.
A. Network
B. Transport
C. Data-link
D. Session
35. Use a simple right shift operation on the bit pattern 1001 1000.
A. 0100 1101
B. 1001 1000
C. 1001 1001
D. 0100 1100
36. _______refers to a process that rounds the value of a sample to the closest integer value. For real
value is 17.2, it can be rounded down to 17; if the value is 17.7, it can be rounded up to
A. Bit depth
B. Encoding
C. Quantization
D. Sampling rate
37. An empty linked list consists of________
A. Data and a link
B. Two nodes
C. A node
D. A null head pointer
38. Registers which are partially visible to users and used to hold conditional codes (bits set by as the
result of operations), are known as
A. PC
B. Memory Address Registers
C. General purpose registers
D. Flags
E. None of the others
39. Symbolic languages were developed in
A. 1950
B. 1962
C. 1980
D. None of the others
E. 1974
40. The ethical principle that dictates that an act is ethical when a majority of people in society
referred to as _____
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
41. The device manager will be tracking every device constantly to ensure that the device is_______
A. Ready
B. Running
C. Functioning properly
D. Finished
42. The_________ manager is responsible for archiving and backup.
A. Memory
B. File
C. Process
D. Device
43. ________is a step-by-step method for solving a problem or doing a task.
A. A construct
B. An algorithm
C. A recursion
D. An iteration
44. After a sequential file is updated, the_________ file contains the most current data
A. Transaction
B. Old master
C. New master
D. Error report
45. In the relational database model data is organized in ______ called relations.
A. None of others
B. Two-dimensional array
C. Two-dimensional tables
D. Two-dimensional record
46. We can convert a number system to decimal. We multiply each digit with its_____...... and add
the result to get the number in the decimal system
A. None of others
B. Values
C. Numbers
D. Place value
47. What is the name given to the molecular-scale computer?
A. None of the others
B. Femtocomputer
C. Nanocomputer
D. Microcomputer
E. Supercomputer
48. If personal information about each employee in a company is stored in a file we can use
______retrieve each record at the end of the month to print the paychecks
A. Sequential file
B. EOF
C. Hashed file
D. Index file
49. An instruction that transfers program control to one or more possible paths is known as
A. Broadband channel
B. None of the others
C. Utility program
D. System software
E. Application program
50. _________is an English-language-like representation of code.
A. A program
B. Pseudocode
C. AUML diagram
D. An algorithm
51. The first electronic special-purpose computer was called________
A. ENIAC
B. Pascaline
C. ABC
D. Pascal
52. A transport-layer payload may be in several network-layer packets.
A. Encrypted
B. Decapsulated
C. Decrypted
D. Encepsulated
53. The enqueue operation _____an item at the ______of the queue.
A. Inserts front
B. Insert rear
C. Delete end
D. Delete front
54. In the binary system, the base b= 2 and we use only two symbols to represent numbers. The
system are often referred to as binary digits or ______?
A. Byte
B. Bitmap
C. Digits
D. Bits
55. In physical layer, a________ can be broadly defined as anything that can carry information form
destination
A. Digital-to-analog conversion
B. Transmission medium
C. Analog-to-digital conversion
D. Digital-to-digital conversion
E. Analog-to-enalog conversion
56. Arithmetic left shift is used to__an integer by two.
A. Multiply
B. Subtraction
C. Addition
D. Divide
57. ____________ a process in which an algorithm calls itself.
A. Insertion
B. Iteration
C. Searching
D. Recursion
58. The binary equivalent of the Octal number 13.54 is ___.
A. All of the others
B. None of the others
C. 1001.1110
D. 1011.1011
E. 1101.1110
59. What is the analysis process in the system implementation phase that will usea program as that
manipulates passive object?
A. Classical analysis
B. All of others
C. Structured analysis
D. Procedure-oriented analysis