0% found this document useful (0 votes)
15 views

Questions

Questions

Uploaded by

Marjorie Lorenzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Questions

Questions

Uploaded by

Marjorie Lorenzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MULTIPLE CHOICE - C) To store data temporarily

1. What is the time complexity of searching for - D) To display information


an element in a balanced binary search tree?
- A) O(log n) 10. What is the primary function of the ALU
- B) O(n) (Arithmetic Logic Unit) in a CPU?
- C) O(n log n) - A) Perform arithmetic and logical operations
- D) O(1) - B) Fetch instructions from memory
- C) Manage communication between devices
2. Which of the following is a linear data - D) Store intermediate results
structure?
- A) Graph 11. Which of the following laws protects
- B) Tree intellectual property in software development?
- C) Stack - A) Data Privacy Act
- D) Hash Table - B) Copyright Law
- C) Labor Law
3. A stack is referred to as a: - D) Health and Safety Law
- A) FIFO structure
- B) LIFO structure 12. Which component is responsible for
- C) LILO structure controlling access to memory in a computer?
- D) Random structure - A) Memory Manager
- B) Process Scheduler
4. Which of the following is an example of a - C) Cache Controller
dynamic data structure? - D) Device Driver
- A) Array
- B) Linked List 13. What is the function of the control unit in a
- C) Static Queue microprocessor?
- D) Matrix - A) Perform arithmetic calculations
- B) Decode and execute instructions
5. The De Morgan’s theorem states: - C) Manage memory
- A) A + B = AB - D) Handle interrupts
- B) (AB)' = A' + B'
- C) A + B = A' B' 14. Which protocol is used to send an email
- D) A B' = A + B from a client to a server?
- A) SMTP
6. A flip-flop is used to store: - B) HTTP
- A) One bit of data - C) FTP
- B) Two bits of data - D) POP3
- C) One byte of data
- D) One kilobyte of data 15. The phase of SDLC where the actual code is
written is called:
7. The CPU communicates with memory using: - A) Design phase
- A) Data bus - B) Testing phase
- B) Control bus - C) Implementation phase
- C) Address bus - D) Maintenance phase
- D) All of the above
16. What is the role of a project manager in
8. Which of the following is the heart of the software engineering?
operating system? - A) Write code for the project
- A) Kernel - B) Manage project timelines and resources
- B) Shell - C) Test the software
- C) User Interface - D) Design the system architecture
- D) System Calls
17. In an operating system, swapping refers to:
9. What is the main purpose of a - A) Moving a process from memory to disk
microprocessor? - B) Moving a process from disk to memory
- A) To provide input to the system - C) Exchanging data between registers
- B) To execute program instructions - D) None of the above
26. What is a real-time operating system
18. In software engineering, a "prototype" (RTOS)?
refers to: - A) An operating system that executes tasks in
- A) A fully developed product real-time
- B) An early approximation of a final system - B) An operating system that supports batch
- C) A finalized user interface design processing
- D) A testing tool - C) An operating system for mobile devices
- D) An operating system that manages multiple
19. Which of the following types of software users
testing is done without executing the code?
- A) Black-box testing 27. Which law protects personal data and
- B) Static testing privacy in online transactions?
- C) Dynamic testing - A) Health and Safety Law
- D) Regression testing - B) Intellectual Property Law
- C) Data Privacy Act
20. Which scheduling algorithm is based on the - D) Anti-Money Laundering Law
time quantum for process execution?
- A) First-Come, First-Served 28. Which storage device provides the fastest
- B) Round-Robin access time?
- C) Shortest Job First - A) Hard Disk Drive (HDD)
- D) Priority Scheduling - B) Solid-State Drive (SSD)
- C) CD-ROM
21. Which of the following is a non-preemptive - D) Magnetic Tape
scheduling algorithm?
- A) Round-Robin 29. Which sorting algorithm has the best time
- B) Priority Scheduling complexity in the average case?
- C) Shortest Job First - A) Quick Sort
- D) First-Come, First-Served - B) Bubble Sort
- C) Insertion Sort
22. In a microprocessor, the instruction cycle - D) Selection Sort
consists of:
- A) Fetch, Decode, Execute 30. What is the key feature of a compiler?
- B) Fetch, Decode, Execute, Store - A) Translates source code into machine code
- C) Fetch, Execute, Decode - B) Interprets instructions line by line
- D) Decode, Fetch, Execute - C) Manages system resources
- D) Converts machine code to source code
23. Which layer of the OSI model is responsible
for error detection and correction? 31. In a linked list, what does the "head" pointer
- A) Physical layer represent?
- B) Data Link layer - A) The last node of the list
- C) Network layer - B) The node before the last node
- D) Transport layer - C) The first node of the list
- D) A null node
24. Which of the following is a form of network
topology? 32. Which operation is performed first in the
- A) Star CPU instruction cycle?
- B) Cluster - A) Execution
- C) Stack - B) Decode
- D) Queue - C) Fetch
- D) Store
25. Which programming paradigm focuses on
objects and data rather than logic and actions? 33. What is the purpose of an interrupt in a
- A) Procedural Programming computer system?
- B) Functional Programming - A) To halt the current process
- C) Object-Oriented Programming - B) To execute low-priority tasks
- D) Assembly Programming - C) To notify the CPU of an external event
- D) To manage memory allocation
- A) Random Access In Disk
34. What is a "critical section" in concurrent - B) Redundant Array of Independent Disks
programming? - C) Remote Access in Disk
- A) A segment of code where multiple threads - D) Reduced Access Independent Disk
can access shared resources
- B) A section of memory where data is written 42. Which of the following is NOT an example of
- C) The part of code where errors occur cloud computing?
- D) A section of code that is never executed - A) AWS
- B) Google Drive
35. What is the main advantage of virtual - C) Dropbox
memory? - D) Local file storage
- A) Faster access to data
- B) Ability to execute programs larger than the 43. What is a primary key in a database?
physical memory - A) A unique identifier for each record
- C) Increased security - B) A foreign key in a table
- D) Less disk space usage - C) A key used to encrypt the database
- D) A pointer to the next table
36. What is the primary purpose of a database
management system (DBMS)? 44. Which architecture is used in
- A) Store and manage data microprocessors today?
- B) Translate programs into machine code - A) Harvard Architecture
- C) Control access to the internet - B) Von Neumann Architecture
- D) Design software interfaces - C) Client-Server Architecture
- D) Three-Tier Architecture
37. In database normalization, which form
eliminates transitive dependencies? 45. In the context of networking, what does
- A) 1NF DNS stand for?
- B) 2NF - A) Data Network System
- C) 3NF - B) Domain Name System
- D) BCNF - C) Direct Network Service
- D) Data Name Service
38. In binary search, the array must be:
- A) Sorted 46. Which of the following data structures
- B) Unsorted follows the FIFO(first in, first out) structure?
- C) Partially sorted - A) Stack
- D) Indexed - B) Queue
- C) Tree
39. Which of the following is an NP-complete - D) Graph
problem?
- A) Linear Search 47. What is the primary function of a router in a
- B) Traveling Salesman Problem network?
- C) Matrix Multiplication - A) To connect different networks
- D) Binary Search - B) To store data
- C) To monitor network traffic
40. What is an algorithm’s worst-case time - D) To secure a network
complexity?
- A) The minimum number of steps an algorithm 48. Which of the following best describes
takes polymorphism in object-oriented programming?
- B) The average number of steps an algorithm - A) The ability of different objects to respond to
takes the same message in different ways
- C) The maximum number of steps an algorithm - B) The ability to inherit properties from a
takes parent class
- D) The best number of steps an algorithm - C) The division of programs into smaller
takes functions
- D) The reusability of code through
41. What does RAID stand for in computer encapsulation
storage?
49. In TCP/IP networking, which layer is
responsible for establishing end-to-end 13. What system converts domain names into IP
communication? addresses?
- A) Application Layer
- B) Transport Layer 14. What core part of an operating system
- C) Network Layer manages resources and hardware
- D) Data Link Layer communication?

50. What is the purpose of a firewall in a 15. What term describes a system of multiple
computer network? disks to improve performance or fault
- A) To filter incoming and outgoing traffic tolerance?
- B) To enhance the speed of network
communication 16. What life cycle process involves
- C) To convert data into packets requirements, design, implementation, testing,
- D) To establish VPN connections and maintenance?

17. What condition in operating systems occurs


IDENTIFICATION: when processes wait indefinitely for each
other?
Here are 30 identification-type questions:
18. What software translates high-level
1. What is the time complexity of inserting an programming language code into machine
element into a binary heap? code?

2. What data structure operates on a LIFO 19. What programming paradigm uses classes
basis? and objects?

3. What tree structure is used for efficient 20. What database feature ensures that
searching and sorting, where each node has at operations are completed fully or not at all?
most two children?
21. What protocol ensures reliable data
4. What table lists all possible values of a transmission in networking?
Boolean expression?
22. What section of code is shared by multiple
5. What basic digital circuit stores one bit of processes and must not be executed
data? simultaneously by more than one process?

6. Which unit in the CPU decodes and executes 23. What principle of OOP restricts direct access
instructions? to an object’s data?

7. What technique improves CPU performance 24. What database process eliminates
by dividing instruction execution into stages? redundancy by organizing data into tables?

8. What is the term for using disk space as an 25. What methodology in software
extension of RAM? development emphasizes iterative progress,
collaboration, and flexibility?
9. What is the signal that informs the CPU of an
event that needs immediate attention? 26. Which layer of the OSI model is responsible
for end-to-end communication and error
10. Which hardware component translates checking?
logical memory addresses into physical ones?
27. What type of CPU scheduling allows a
11. What memory management technique process to be interrupted and moved out of the
divides the process into fixed-size pages? CPU before completion?

12. What is the most common protocol used in 28. What small, high-speed memory is used to
wired local area networks? store frequently accessed data in a computer?
29. What type of computing delivers services
over the internet, such as storage and
computing power?
30. What network security device filters
incoming and outgoing traffic based on
predefined rules?

You might also like