0% found this document useful (0 votes)
15 views33 pages

CS101 Quizes

abc

Uploaded by

yojiva2518
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views33 pages

CS101 Quizes

abc

Uploaded by

yojiva2518
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

CS101 MCQs

1. What is the primary purpose of text representation in computing?


- A) To display images
- B) To process numeric values
- C) To encode characters for storage and processing
- D) To communicate with hardware

2. Which of the following is a standard format for representing characters?


- A) HTML
- B) ASCII
- C) JPG
- D) PNG

3. In binary representation, what does the code "01000001" represent?


- A) 1
- B) A
- C) B
- D) 65

4. How is data represented in computer memory?


- A) Decimal
- B) Hexadecimal
- C) Binary
- D) Octal

5. The ASCII code for the capital letter 'C' is:


- A) 67
- B) 99
- C) 65
- D) 68

6. How many characters can be represented by standard ASCII?


- A) 128
- B) 256
- C) 512
- D) 1024

7. What would the ASCII representation of the word "DOG" be?


- A) 68 79 71
- B) 68 77 71
- C) 68 79 90
- D) 65 66 67

8. What is a major limitation of ASCII?


- A) It can represent only text.
- B) It does not support special characters.
- C) It has a limited character set (128 characters).
- D) It only works with uppercase letters.

9. One of the limitations of ASCII extensions, like ISO 8859-1, is:


- A) They are not widely used.
- B) They restrict the total character set to 256.
- C) They can only handle Latin scripts.
- D) They are incompatible with Unicode.

10. What is the primary advantage of Unicode over ASCII?


- A) Higher performance
- B) It can represent a larger variety of characters, including various languages.
- C) It uses fewer bytes.
- D) It is a proprietary format.

11. UTF-8 is a variable-width character encoding that can use:


- A) 1 to 4 bytes per character
- B) 1 to 8 bytes per character
- C) 2 to 6 bytes per character
- D) 1 to 12 bytes per character

12. In binary, which of the following represents the number 5?


- A) 100
- B) 101
- C) 110
- D) 111

13. Storing numeric values as Unicode can lead to:


- A) Increased storage space usage
- B) Loss of data precision
- C) Simpler operations
- D) None of the above

14. Which notation system is used in computers?


- A) Decimal
- B) Binary
- C) Hexadecimal
- D) All of the above

15. What is one variation of binary notation?


- A) BCD (Binary-Coded Decimal)
- B) ASCII
- C) Unicode
- D) Fractional Binary

16. How do computers represent images?


- A) As a series of audio signals
- B) As a collection of pixels
- C) As mathematical equations
- D) As textual data

17. A pixel is:


- A) The smallest unit of a digital image
- B) A process of data compression
- C) A type of image encoding
- D) A color profile

18. What does a bitmap image contain?


- A) Only color data
- B) Pixel information along with color depth
- C) Only metadata
- D) Vector graphics data

19. How are shades represented in an image?


- A) By varying the pixel sizes
- B) By changing the pixel colors based on intensity
- C) By ignoring them
- D) By using only black and white pixels

20. How is a full-color image typically represented?


- A) Using a single 8-bit value
- B) Using RGB values for each pixel
- C) As binary text
- D) With ASCII codes

21. Brightness in video signals is commonly referred to as:


- A) Luminance
- B) Saturation
- C) Hue
- D) Chroma

22. What does image scaling refer to?


- A) Increasing the resolution of an image
- B) Altering the size of an image without changing its aspect ratio
- C) Changing the color depth of an image
- D) Compressing the image for storage

23. Which geometric structure is most commonly used for image scaling?
- A) Pixel
- B) Vector
- C) Bitmap
- D) Matrix

24. What is a defining feature of scalable fonts?


- A) Fixed pixel size
- B) Resolution-independent scaling
- C) Only available in black and white
- D) Requires special software to use

25. Sound is typically represented in a computer as:


- A) Bits
- B) Waves
- C) Frequencies
- D) Samples

26. Amplitude in sound refers to:


- A) The tone of the sound
- B) The frequency of sound waves
- C) The loudness of the sound
- D) The duration of the sound

27. Sound can be encoded using which method?


- A) Sampling
- B) Binary coding
- C) ASCII conversion
- D) Both A and B

28. Sound data communication is typically done through:


- A) Serial ports
- B) Digital signals
- C) Analog signals
- D) All of the above

29. In digital audio, sample intervals refer to:


- A) The time between consecutive samples
- B) The length of the audio segment
- C) The frequency of the sound
- D) The number of audio channels

30. MIDI is primarily used to represent:


- A) Audio waveforms
- B) Musical notes and controls
- C) Text documents
- D) Video data

31. In binary notation, what does the decimal number 10 convert to?
- A) 1000
- B) 1010
- C) 1100
- D) 1110
32. The power method for binary numbers determines:
- A) The total number of bits
- B) The value of each bit position
- C) The decimal equivalent
- D) The hexadecimal equivalent

33. To convert a decimal number to binary, you would use division by:
- A) 10
- B) 2
- C) 8
- D) 16

34. What is the result of binary addition of 1011 + 0011?


- A) 1100
- B) 1110
- C) 10000
- D) 10100

35. In binary, which of the following represents 0.5?


- A) 0.1
- B) 0.01
- C) 0.11
- D) 1.0

36. The radix point in binary is equivalent to which of the following in decimal?
- A) Period
- B) Comma
- C) Hyphen
- D) Slash

37. In binary, what is the radix point of the number 101.01?


- A) Between the first and second digit
- B) Between the second and third digit
- C) Between the third and fourth digit
- D) No radix point exists

38. Adding the binary fractions 0.110 + 0.011 gives:


- A) 0.1001
- B) 0.0101
- C) 1.0001
- D) 0.1011

39. In 2's complement notation, the value of -1 is represented as:


- A) All 0's
- B) All 1's
- C) 0111
- D) 1000
40. What is the maximum positive number in 4-bit 2's complement?
- A) 7
- B) 8
- C) 15
- D) 16

41. To convert a positive binary number to a negative number in 2's complement,


you:
- A) Invert the bits and add one
- B) Invert the bits and subtract one
- C) Shift left
- D) Add a leading zero

42. Adding two negative numbers in 2’s complement can lead to:
- A) An overflow
- B) A carried 1
- C) A loss of precision
- D) An underflow

43. What can overflow in binary addition indicate?


- A) Incorrect operation
- B) A carry bit that goes outside the number of bits
- C) Too small a number
- D) Wrong data type

44. Excess notation is:


- A) A method of representing negative numbers
- B) A technique for simplifying binary arithmetic
- C) A way to encode integers using a biased representation
- D) Only used in floating-point representation

45. In Excess-127 representation, the number 1010 is stored as:


- A) 111
- B) 139
- C) 10
- D) 127

46. Excess Four notation is primarily used in:


- A) ASCII encoding
- B) Binary-coded decimal (BCD) representation
- C) Unicode
- D) Audio encoding

47. Which is true of Excess Four notation compared to standard binary?


- A) It stores negative numbers more easily
- B) It adds complexity to operations
- C) It can represent decimal values directly
- D) It is limited to decimal digits only

48. Floating point notation is used to represent:


- A) Large integers
- B) Decimal numbers
- C) Both large integers and fractional numbers
- D) Only negative numbers

49. How is the radix stored in floating point representation?


- A) As an exponent
- B) As a fixed number
- C) As a mantissa
- D) It is not stored

50. Floating-point representation stores fractions by:


- A) Using a denominator
- B) Expressing them in binary
- C) Using normalized values
- D) Simply ignoring them

51. Truncation errors occur in floating point notation when:


- A) The precision of number representation is insufficient
- B) Numbers are added incorrectly
- C) Values are too large
- D) Integers are converted to decimals

52. A primitive method to handle truncation errors is:


- A) Rounding
- B) Using bigger data types
- C) Increasing sample rates
- D) Ignoring the error

53. Intelligent processing in truncation error handling involves:


- A) Adaptive algorithms to improve accuracy
- B) Ignoring small errors
- C) Always rounding up
- D) Decreasing sample sizes

54. What is the purpose of data compression?


- A) To increase file size
- B) To reduce the amount of data required to represent information
- C) To slow down data transfer
- D) To maintain original data quality

55. Which of the following methods is commonly used to compress images?


- A) JPEG
- B) WAV
- C) TXT
- D) MIDI

56. Lossy compression is often used for:


- A) Text files
- B) Audio files
- C) Executable files
- D) Image files

57. What is the primary function of the CPU?


- A) Store data
- B) Execute instructions and process data
- C) Provide network connectivity
- D) Display graphics

58. The stored program concept allows:


- A) Programs to be input through physical media
- B) Instructions and data to be stored in memory
- C) Hardware access control
- D) Direct communication with output devices

59. Which of the following is a CPU architecture philosophy?


- A) RISC (Reduced Instruction Set Computer)
- B) SCSI (Small Computer System Interface)
- C) DRAM (Dynamic Random Access Memory)
- D) USB (Universal Serial Bus)

60. What category do the instructions for arithmetic operations belong to?
- A) Control instructions
- B) Data transfer instructions
- C) Arithmetic instructions
- D) Logic instructions

61. What is a common method for data transfer between CPU and memory?
- A) Direct Memory Access (DMA)
- B) Pipelining
- C) Interrupt handling
- D) Software toggling

62. The arithmetic/logic unit (ALU) is responsible for:


- A) Generating addresses
- B) Performing calculations and logical operations
- C) Controlling input devices
- D) Managing memory reads

63. The control unit in a CPU is responsible for:


- A) Fetching data
- B) Executing instructions
- C) Directing the operation of the processor
- D) Storing temporary data

64. During program execution, which step comes first?


- A) Fetching the program
- B) Decoding the instructions
- C) Executing the instructions
- D) Storing the output

65. In a program execution cycle, the action of loading an instruction from memory is
known as:
- A) Writing
- B) Fetching
- C) Storing
- D) Executing

66. Which of the following is a logic operator?


- A) AND
- B) ADD
- C) LOAD
- D) STORE

67. What operation does rotating bits to the left perform?


- A) Shifts all bits to the right
- B) Moves the leftmost bit to the rightmost position
- C) Randomizes the bits
- D) Statically moves bits into one place

68. The arithmetic operator for multiplication in many programming languages is:
- A) *
- B) x
- C) #
- D) %

69. The controller in a computer system primarily:


- A) Manages data graphics
- B) Directs the flow of data inside the system
- C) Increases memory capacity
- D) Powers the system

70. Direct Memory Access (DMA) is used to:


- A) Speed up the CPU
- B) Allow devices to communicate with memory without CPU intervention
- C) Increase storage capabilities
- D) Encrypt data
71. In data transmission, what is bandwidth?
- A) The distance data travels
- B) The amount of data that can be transmitted in a given time
- C) The quality of the connection
- D) The type of connections used

72. In parallel communication, how many bits are transmitted simultaneously?


- A) One
- B) Two
- C) Eight or more
- D) None

73. Serial communication involves transmitting data:


- A) All at once
- B) In a single stream, one bit at a time
- C) In two streams simultaneously
- D) As signals rather than bits

74. Pipelining in CPU architecture is used to:


- A) Increase instruction execution speed
- B) Improve data storage
- C) Minimize heat output
- D) Maximize memory usage

75. The first widely used operating system was:


- A) UNIX
- B) MS-DOS
- C) Windows
- D) IBM OS/360

76. What is the main purpose of an operating system?


- A) Manage hardware and software resources
- B) Store data
- C) Create applications
- D) Perform calculations

77. Which of the following is NOT a function of an operating system?


- A) Process management
- B) Network management
- C) Word processing
- D) Memory management

78. Operating systems can be classified as:


- A) Real-time and batch
- B) Online and offline
- C) Compiled and interpreted
- D) All of the above

79. Which component of an operating system is responsible for managing resources?


- A) User Interface
- B) Kernel
- C) Shell
- D) Application programs

80. The graphical user interface (GUI) is part of which OS component?


- A) Kernel
- B) User Interface
- C) Shell
- D) Firmware

81. Which step comes first in the booting process?


- A) Load the operating system kernel
- B) Execute startup programs
- C) Run hardware diagnostics
- D) Initialize the file system

82. A process is defined as:


- A) A temporary file
- B) An instance of a running program
- C) A network request
- D) An input/output operation

83. To avoid resource conflicts, operating systems use:


- A) Scheduling algorithms
- B) Coordination
- C) Error correction
- D) All of the above

84. Semaphores are used in operating systems for:


- A) Memory allocation
- B) Process synchronization
- C) File handling
- D) User management

85. A deadlock occurs when:


- A) Two tasks complete simultaneously
- B) Processes prevent each other from accessing the necessary resources
- C) A process runs without a user interface
- D) An application crashes

86. External security attacks target:


- A) User accounts
- B) Network services
- C) System files
- D) All of the above

87. Internal security threats usually come from:


- A) System bugs
- B) Malicious software intentionally introduced by insiders
- C) Hardware failures
- D) Unauthorized network access

88. Which of the following is a classification of networks?


- A) LAN (Local Area Network)
- B) WAN (Wide Area Network)
- C) PAN (Personal Area Network)
- D) All of the above

89. Which protocol is most commonly used for web traffic?


- A) FTP
- B) HTTP
- C) POP3
- D) SMTP

90. What does the term "internetworking" refer to?


- A) Connecting different networks together
- B) Creating a single Local Network
- C) Sending emails
- D) Both A and C

91. Which of the following is a method for process communication?


- A) Shared memory
- B) Message passing
- C) Sockets
- D) All of the above

92. In a distributed system:


- A) Resources are managed by a single computer
- B) Each process must be aware of each other’s state
- C) Computers work independently
- D) All of the above

93. The architecture of the Internet is based on:


- A) Client-server model
- B) Peer-to-peer model
- C) Both A and B
- D) Peer-to-peer only

94. Which address is used to identify a device on the Internet?


- A) Email address
- B) IP address
- C) URL
- D) MAC address

--------------------------------------------------------------------------------------

1. The main difference between ASCII and Unicode is:


- A) Encoding scheme
- B) Number of characters supported
- C) File sizes
- D) Use cases

2. What does the acronym UTF stand for?


- A) Universal Text Formatting
- B) Unicode Text Format
- C) Unicode Transformation Format
- D) Unified Text Function

3. In binary representation, what does “0110” represent in decimal?


- A) 4
- B) 6
- C) 8
- D) 10

4. Which of the following is a limitation of using UTF-8?


- A) Limited to 256 characters
- B) Variable length encoding may lead to complexity in parsing
- C) Cannot represent emojis
- D) Works only for Latin scripts

5. What is the main purpose of BCD (Binary-Coded Decimal)?


- A) To enhance image representation
- B) To compact text data
- C) To represent decimal numbers in binary form
- D) To convert between color formats

6. How many bytes are needed to represent a character in UTF-16?


- A) 1
- B) 2
- C) 3
- D) 4

7. What does the term "Endianness" refer to?


- A) The method of compression
- B) The order of bytes in binary representation
- C) The organization of data in memory
- D) The error handling in data transfer
8. Which is a type of binary tree used to store binary-coded decimal numbers?
- A) AVL Tree
- B) B-Tree
- C) Binary Search Tree
- D) Quadtree

9. In the context of image representation, what does DPI stand for?


- A) Dots Per Inch
- B) Digital Privacy Index
- C) Data Processing Instructions
- D) Dynamic Pixel Integration

10. In audio files, which of the following formats is commonly compressed using
lossy compression?
- A) WAV
- B) FLAC
- C) MP3
- D) AIFF

11. How are integers typically stored in floating-point notation?


- A) Using two's complement
- B) Using mantissa and exponent
- C) As binary-coded decimal
- D) As hexadecimal values

12. What does the acronym MIDI stand for in music technology?
- A) Musical Instrument Data Interface
- B) Music Internal Digital Interface
- C) Musical Input Device Interface
- D) Music Indirect Display Interface

13. In the context of sound, the term "sampling rate" refers to:
- A) The number of channels in an audio file
- B) The number of samples taken per second
- C) The size of the audio file
- D) The quality of sound output

14. In image processing, the term "alpha channel" refers to:


- A) Grayscale values
- B) Image resolution
- C) Transparency level
- D) Color depth

15. What is the maximum decimal value that can be represented in 4 bits?
- A) 8
- B) 15
- C) 16
- D) 7

16. In digital communication, what does the acronym CRC stand for?
- A) Centralized Resource Control
- B) Cyclic Redundancy Check
- C) Common Return Channel
- D) Computerized Redundancy Checksum

17. What is the basic function of a codec?


- A) To compress and decompress audio or video data
- B) To enhance video resolution
- C) To transmit data over the internet
- D) To store files securely

18. Which of the following methods is NOT typically used for audio compression?
- A) PCM
- B) AAC
- C) WMA
- D) TIFF

19. What type of compression does PNG use?


- A) Lossy compression
- B) Lossless compression
- C) Adaptive compression
- D) Contextual compression

20. In programming languages, what does "malloc" stand for?


- A) Memory Allocation
- B) Manual Allocation
- C) Multiple Allocation
- D) Minimal Allocation

21. The representation of colors in digital imaging is commonly based on which


model?
- A) CYMK
- B) HSL
- C) RGB
- D) LAB

22. What does the acronym VRAM stand for in graphics hardware?
- A) Video Random Access Memory
- B) Variable Read Access Memory
- C) Virtual Readable Access Memory
- D) Video Read Access Memory

23. The primary purpose of a file system is to:


- A) Encrypt data
- B) Format data
- C) Organize and manage files on a storage device
- D) Backup files

24. In computer graphics, what does the term "texture mapping" refer to?
- A) Adding detail to 2D images
- B) Applying a texture to 3D models
- C) Compressing image files
- D) Color correction in rendering

25. In networking, what does NAT stand for?


- A) Network Access Translation
- B) Network Address Translation
- C) Node Address Translation
- D) Network Application Translation

26. Which of the following describes lossy compression?


- A) All original data is retained
- B) Some original data is lost for reduced file size
- C) Data is encrypted
- D) Data is compressed without any modification

27. What does the acronym HTTP stand for?


- A) Hypertext Transfer Protocol
- B) High Transfer Text Protocol
- C) Hyperlink Transfer Protocol
- D) Hightext Transfer Protocol

28. In binary, what is the representation of the decimal number 13?


- A) 1100
- B) 1101
- C) 1001
- D) 1011

29. The term "lossless" in data compression means that:


- A) The original data is compressed efficiently
- B) The original data can be perfectly reconstructed
- C) Data is permanently deleted
- D) The file size is increased

30. Which of the following is NOT a characteristic of a raster image?


- A) Resolution-dependent
- B) Comprised of pixels
- C) Scalable without quality loss
- D) Commonly used for photographs
31. In the context of network security, what does DDoS stand for?
- A) Dynamic Distributed Online Service
- B) Distributed Denial of Service
- C) Digital Domain of Service
- D) Data Denial of Service

32. The term "color depth" in digital imaging refers to:


- A) The resolution of the image
- B) The number of bits used to represent the color of a single pixel
- C) The amount of colors visible in a color model
- D) The image brightness levels

33. In computer graphics, which technique is used for rendering shadows?


- A) Ray tracing
- B) Texture mapping
- C) Polygonal modeling
- D) Rasterization

34. What does the acronym API stand for?


- A) Application Program Interface
- B) Advanced Programming Interface
- C) Application Protocol Interface
- D) Application Performance Indicator

35. Which file format supports both lossy and lossless compression?
- A) JPEG
- B) PNG
- C) WEBP
- D) TIFF

36. A "query" in databases typically refers to:


- A) A command that retrieves data
- B) A backup process
- C) A security check
- D) An indexing algorithm

37. In computer networking, what does LAN stand for?


- A) Local Area Network
- B) Long Area Network
- C) Low Area Network
- D) Layered Access Network

38. The term "latency" in data transmission refers to:


- A) The speed of the data transfer
- B) The delay before a transfer of data begins
- C) The amount of data being transferred
- D) The type of data protocol used
39. In digital files, what does the abbreviation GIF stand for?
- A) Graphic Interchange Format
- B) General Image Format
- C) Graphics Internet Format
- D) Global Image Format

40. Resolution in digital images is typically referred to in terms of:


- A) Color depth
- B) Pixel dimensions (width x height)
- C) File size
- D) Aspect ratio

41. What does the abbreviation SQL stand for in database management?
- A) Structured Query Language
- B) Standard Query Language
- C) Systematic Query Language
- D) Structured Quick Language

42. The main characteristic of a bitmapped image file is that it:


- A) Allows for scaling without loss of quality
- B) Is made up of pixels
- C) Can be easily converted to vector format
- D) Uses mathematical equations to represent images

43. What is the primary purpose of the Domain Name System (DNS)?
- A) To assign IP addresses to devices
- B) To translate domain names into IP addresses
- C) To secure web traffic
- D) To balance network loads

44. The format that uses a lossless method of compression while retaining
transparency is:
- A) JPEG
- B) PNG
- C) GIF
- D) TIFF

45. In programming, which of the following is a common data structure that uses
key-value pairs?
- A) Array
- B) Queue
- C) Hash Table
- D) Stack

46. In software development, what does "refactoring" refer to?


- A) Changing the code’s functionality without altering its behavior
- B) Completely rewriting the software
- C) Merging multiple codebases
- D) Incorporating third-party libraries

47. What does the acronym VPN stand for?


- A) Virtual Private Network
- B) Virtual Protected Network
- C) Variable Private Network
- D) Visual Protected Network

48. The term used to describe the reduction of file size without losing any quality is
called:
- A) Compression
- B) Decompression
- C) Compilation
- D) Conversion

49. The concept of “Big O notation” is used in computer science to describe:


- A) The speed of data access
- B) The efficiency of an algorithm
- C) The size of a data set
- D) The network latency

50. Which of the following is a feature of PostScript?


- A) Integrates both text and graphics on the same page
- B) Only supports raster graphics
- C) Is a proprietary format developed by Microsoft
- D) Cannot be scaled

----------------------------------------------------------------------------------------------------------

1. In binary notation, what is the decimal equivalent of the binary number 1101?
- A) 11
- B) 13
- C) 14
- D) 15

2. What is the power of 2 representation used to express the binary number 10110?
- A) \(2^4 + 2^2\)
- B) \(2^5 + 2^3 + 2^1\)
- C) \(2^4 + 2^3 + 2^1\)
- D) \(2^5 + 2^2 + 2^0\)

3. To find the binary representation of the decimal number 25, which process is
used?
- A) Divide by 2 and keep track of the remainders.
- B) Multiply by 2 until you reach 0.
- C) Subtract the largest powers of 2.
- D) Convert into hexadecimal first.

4. What is the result of adding two binary numbers: 1011 and 1101?
- A) 10000
- B) 10100
- C) 1110
- D) 11000

5. In binary, how is the fraction 0.625 represented?


- A) 0.101
- B) 0.1001
- C) 0.110
- D) 0.111

6. In the context of binary fractions, what does the radix point represent?
- A) The point where the number begins
- B) The division between whole numbers and fractional parts
- C) The average value of a binary number
- D) The standard form of binary notation

7. Given the binary number 110101.1, what is the value of the fractional part?
- A) 0.1
- B) 0.25
- C) 0.5
- D) 0.75

8. What is the binary addition of the fractions 0.011 and 0.101?


- A) 0.1000
- B) 0.1001
- C) 0.110
- D) 0.111

9. The 2’s complement notation is primarily used to:


- A) Simplify addition of binary numbers
- B) Represent negative numbers
- C) Convert decimal fractions
- D) Store character data

10. In 2’s complement notation, how is the number -5 represented in 8 bits?


- A) 11111010
- B) 11111001
- C) 00000101
- D) 11111000

11. When converting a positive binary number to a negative representation using 2’s
complement, the procedure includes:
- A) Adding one to the binary number
- B) Inverting the bits and adding one
- C) Shifting to the left
- D) Doubling the binary number

12. What is the result of adding the 2’s complement binary numbers 0110 and 1100?
- A) 0100
- B) 0010
- C) 1110
- D) 1 (with overflow)

13. What is a common issue that occurs when adding two binary numbers?
- A) Information Loss
- B) Overflow
- C) Underflow
- D) Loss of precision

14. In Excess-Notation, what does the base represent?


- A) The minimum value represented
- B) The middle value
- C) The maximum value
- D) The offset for representation

15. Which of the following describes how numbers are represented in Excess-127
notation?
- A) Using the actual value plus 127
- B) Using powers of 10
- C) Direct binary conversion
- D) Using decimal digits

16. Excess Four notation allows for how many unique representations?
- A) 4
- B) 8
- C) 16
- D) 10

17. What is the main advantage of using Floating Point Notation?


- A) Simple representation of integers
- B) Increased range for very large and small numbers
- C) Efficient storage in memory
- D) Fast computational speed

18. When storing fractions in floating-point representation, the precision is limited


by:
- A) Number of bits allocated to the exponent
- B) Representation of the fraction in the mantissa
- C) The arithmetic operations performed
- D) The number of total bits used

19. Truncation errors in floating-point representation occur when:


- A) The number exceeds the maximum value
- B) Bits are truncated after multiplication
- C) The precision limit is exceeded
- D) Integer values are converted to floating-point

20. A primitive method to handle truncation errors might involve:


- A) Rounding to the nearest value
- B) Ignoring excess digits
- C) Using integer arithmetic exclusively
- D) Scaling the calculation

21. Data compression techniques generally aim to:


- A) Reduce the amount of data that needs to be transmitted or stored
- B) Increase redundancy for security
- C) Ensure data integrity
- D) Facilitate faster processing

22. Which of the following describes the primary method of compressing images?
- A) Changing color depth
- B) Using lossy compression techniques like JPEG
- C) Simply reducing resolution
- D) Adjusting brightness levels

23. When compressing audio, which format is commonly used for lossy
compression?
- A) BMP
- B) MP3
- C) PNG
- D) WAV

24. In data manipulation, a CPU primarily performs which of the following tasks?
- A) Manage storage devices
- B) Execute instructions and process data
- C) Handle user input and output
- D) Transfer data over a network

25. The stored-program concept pioneered by John von Neumann refers to:
- A) Storing programs on external drives
- B) The ability to store program instructions in memory
- C) The use of punch cards for program execution
- D) The separation of software and hardware

26. Which of the following is NOT a philosophy of CPU architecture?


- A) RISC (Reduced Instruction Set Computer)
- B) CISC (Complex Instruction Set Computer)
- C) DMA (Direct Memory Access)
- D) VLIW (Very Long Instruction Word)

27. Machine instruction categories typically do NOT include:


- A) Data Transfer Instructions
- B) Control Instructions
- C) Communication Instructions
- D) Arithmetic Instructions

28. In the data transfer group, devices communicate primarily using:


- A) Serial communication
- B) Pipelined processing
- C) Encrypted transfer methods
- D) Packet switching

29. The arithmetic/logic group of CPU handles:


- A) Basic data connections
- B) Logical and arithmetic operations
- C) Power management functions
- D) Input/output control

30. The role of the controller in a computer system is to:


- A) Generate data output
- B) Oversee the operations of the CPU
- C) Manage memory usage
- D) Control device communication

31. A common issue with direct memory access (DMA) is:


- A) Increased CPU load
- B) Memory fragmentation
- C) Slower data transfers
- D) Handshaking conflicts

32. Which of the following describes parallel communication?


- A) Single-bit transfer
- B) Multiple bits sent simultaneously
- C) Sequential device connections
- D) Unidirectional data flow

33. An advantage of serial communication over parallel communication is:


- A) Higher speed
- B) Simpler wiring
- C) Lower cost
- D) Better reliability at long distances

34. Pipelining in a CPU architecture improves:


- A) The storage capacity
- B) The efficiency of instruction processing
- C) The power consumption
- D) The type of instructions executed

35. The history of operating systems began with:


- A) The development of the GUI
- B) Command-line interfaces
- C) Batch processing systems
- D) Real-time operating systems

36. The main function of an operating system is:


- A) To design hardware
- B) To manage system resources and facilitate user interaction
- C) To provide user applications
- D) To operate independently of applications

37. What is a characteristic of monolithic operating systems?


- A) Modular structure
- B) Simplistic kernel
- C) Unified code base for core services
- D) Layered architecture

38. Which task is part of the booting process?


- A) Hashing user passwords
- B) Running security checks
- C) Loading the operating system kernel
- D) Initializing network settings

39. In operating systems, examples of software classification include:


- A) System software and application software
- B) Open-source and proprietary software
- C) Public and private software
- D) Overhead software and core software

40. What is the role of semaphores in an operating system?


- A) Allocate memory
- B) Synchronize processes to prevent race conditions
- C) Execute instructions
- D) Manage user input

41. The concept of deadlock occurs when:


- A) Multiple processes compete for the same resource and cannot proceed
- B) the system is overloaded
- C) Data transfer rates are too low
- D) The CPU overheats and shuts down
42. The term "security attacks from outside" refers to:
- A) Internal data breaches
- B) External threats such as hackers and malware
- C) Software bugs
- D) Hardware failures

43. In networking, what does the term “protocol” most effectively define?
- A) A physical connection method
- B) A set of rules governing data communication
- C) The layout of network devices
- D) The bandwidth of a connection

44. A LAN (Local Area Network) is typically characterized by:


- A) A network covering a large geographic area
- B) High-speed connections
- C) Connections over long distances
- D) Connections primarily through satellite links

45. What is the primary function of the Internet Protocol (IP)?


- A) To ensure secure communication
- B) To route and address packets of data
- C) To provide a user interface
- D) To verify user credentials

46. In distributed systems, the synchronization of processes is crucial for:


- A) Increasing processing speed
- B) Preventing data inconsistency and conflict
- C) Reducing administration overhead
- D) Maximizing network performance

47. What is a typical advantage of a distributed network?


- A) Increased vulnerability to attacks
- B) Lower cost of management
- C) Enhanced performance from resource pooling
- D) Reduced redundancy

48. Which of the following is an example of a protocol used for process


communication in networking?
- A) TCP (Transmission Control Protocol)
- B) DNS (Domain Name System)
- C) HTTP (HyperText Transfer Protocol)
- D) All of the above

49. When combining networks, the main consideration should be:


- A) The speed of the broadband connection
- B) Compatibility between different network protocols
- C) The number of users in each network
- D) The type of hardware used

50. In network classification, a WAN (Wide Area Network) typically connects:


- A) Devices within a single building
- B) Devices across multiple locations, often globally
- C) Devices in a local vicinity
- D) Devices using only Wi-Fi connections

---------------------------------------------------------------

1. In binary notation, what is the 8-bit representation of the decimal number 63?
- A) 00111111
- B) 00110111
- C) 01111111
- D) 01100111

2. What does the term "Bit" refer to in digital systems?


- A) A byte
- B) The smallest unit of data, represented as 0 or 1
- C) A file size measurement
- D) A character encoding system

3. What might be the result of adding the binary numbers 1110 and 0001?
- A) 1111
- B) 10000
- C) 1110
- D) 0001

4. The binary number system is base:


- A) 8
- B) 10
- C) 2
- D) 16

5. To convert the decimal number 5 into binary, which sequence of operations would
you perform?
- A) Subtract 3 and convert
- B) Divide by 2 and record the remainders
- C) Multiply by 2 constantly
- D) Add numbers until reaching 5

6. In the context of binary representation, what does the term "overflow" refer to?
- A) An error in data transmission
- B) When the result of an arithmetic operation exceeds the range representable by
the number of bits
- C) Data being lost due to network issues
- D) Maximum memory usage in a CPU
7. Excess-127 notation is used primarily in which context?
- A) Image encoding
- B) Floating-point representation
- C) Integer programming
- D) Network protocols

8. What is the primary purpose of 2's complement representation?


- A) To reduce memory usage
- B) To represent negative numbers
- C) To simplify binary addition
- D) To improve data transmission speeds

9. What is the pattern for converting a number from 2's complement back to its
original decimal form?
- A) Add 1 to the least significant bit
- B) Invert the bits and add 1
- C) Subtract the max representable value
- D) Multiply the significant digits by their place values

10. How is the number -13 represented in an 8-bit 2's complement?


- A) 11110011
- B) 11101101
- C) 10001101
- D) 11110010

11. Given a binary overflow occurs after adding two 8-bit 2's complement numbers,
what is the logical conclusion?
- A) The result still can be interpreted correctly
- B) The result wraps around and can be misinterpreted
- C) An error occurs without a resultant value
- D) The addition operation cannot be performed

12. In radix point representation, what does the position of the digit determine?
- A) The numerical value of the digit
- B) The overall number of non-unique values
- C) The corresponding byte size
- D) The encryption process

13. What is the binary representation of the decimal number 0.75?


- A) 0.11
- B) 0.101
- C) 0.111
- D) 0.110

14. If given the binary fraction 0.1011, how would you represent this fraction in
decimal?
- A) 0.6875
- B) 0.625
- C) 0.875
- D) 0.75

15. When considering 2's complement, the number of bits used significantly impacts
the:
- A) Data transfer speed
- B) Maximum and minimum values representable
- C) Computer power consumption
- D) Amount of memory available

16. The binary number 1011.01 contains how many digits to the right of the binary
point?
- A) 1
- B) 2
- C) 3
- D) 4

17. Excess Notation uses a fixed bias to encode positive and negative numbers. What
is the bias used for Excess-2 notation?
- A) 1
- B) 2
- C) 3
- D) 127

18. In floating-point representation, the "mantissa" represents:


- A) The scale of the number
- B) The significant digits of the number
- C) The decimal value only
- D) The exponent alone

19. Floating-point numbers are commonly expressed in which of the following


formats?
- A) IEEE 754
- B) ASCII
- C) ANSI
- D) UNICODE

20. When a floating-point operation exceeds its range and results in an undefined
number, this is commonly referred to as:
- A) Underflow
- B) Overflow
- C) Rounding error
- D) Truncation error
21. What is one of the practical challenges with floating-point arithmetic in
programming?
- A) They consume excess memory
- B) They cannot represent integer data
- C) Rounding errors may occur due to finite precision
- D) They are not supported in most programming languages

22. Which of the following is NOT a typical method for handling truncation errors in
floating point arithmetic?
- A) Using a lower precision format
- B) Rounding the result to the nearest representable number
- C) Arbitrary-precision arithmetic libraries
- D) Normalization of results

23. Data compression primarily aims to:


- A) Increase file size for security
- B) Reduce file sizes for storage and transmission efficiency
- C) Enhance the quality of data
- D) Transform data formats

24. Lossy compression methods typically lead to:


- A) Exact replicas of original files
- B) Data that can never be restored to its original form
- C) No loss of quality
- D) Equal sizes regardless of compression steps

25. Which file format is commonly associated with image compression?


- A) PNG
- B) JPEG
- C) WAV
- D) ZIP

26. Which of the following describes a characteristic of the CPU's arithmetic/logic


unit (ALU)?
- A) Executes control instructions
- B) Handles data storage
- C) Performs arithmetic and logical operations
- D) Manages input/output ports

27. The process of retrieving and executing instructions from memory is known as:
- A) Fetch-decode-execute cycle
- B) Data transfer cycle
- C) Memory allocation cycle
- D) Instruction set cycle

28. What technology enables Direct Memory Access (DMA)?


- A) Multithreading
- B) Interrupt-driven I/O
- C) Continuous processing
- D) Side-car architecture

29. In the control group of a CPU, the primary function is to:


- A) Keep track of the main memory
- B) Execute arithmetic operations
- C) Manage execution timing and sequencing
- D) Facilitate data input/output

30. What occurs during pipelining in CPU processing?


- A) Programs are executed in parallel
- B) Multiple instructions are overlapped in execution
- C) Memory is allocated and deallocated
- D) Data is fetched from external devices

31. In the field of operating systems, what is NOT a common role?


- A) Process management
- B) Managing hardware resources
- C) Generating user applications
- D) Providing user memory access

32. Which operating system component is responsible for managing processes and
memory?
- A) Shell
- B) Kernel
- C) User Interface
- D) Application Software

33. The booting process of an operating system primarily consists of:


- A) Installing device drivers
- B) Loading the kernel and initializing hardware
- C) Executing user applications
- D) Backing up system files

34. In semaphore usage, the purpose of a semaphore is to:


- A) Allocate hardware resources
- B) Protect shared resources and prevent deadlock
- C) Execute concurrent processes
- D) Store data in a structured way

35. A deadlock is best described as:


- A) System resources are fully utilized
- B) A situation where processes wait indefinitely for resources held by each other
- C) A temporary pause in processing
- D) A point where the CPU is idle
36. The main purpose of an operating system kernel is:
- A) Manage fixed commands for hardware
- B) Provide user application interfaces
- C) Oversee core processing and resource management
- D) Facilitate network communications

37. A characteristic of monolithic operating systems is that they:


- A) Have modular components
- B) Are easier to maintain
- C) Include all services in a singular structure
- D) Are designed for specific hardware

38. An example of protocol in networking is:


- A) HTML
- B) TCP/IP
- C) SQL
- D) JPEG

39. When classifying networks, a WAN primarily connects:


- A) Devices within a city
- B) Devices across large geographical distances
- C) Devices using wireless technologies
- D) Devices locally

40. In networking, what does “throughput” refer to?


- A) Maximum data transfer speed
- B) Actual data transfer rate achieved
- C) Bandwidth capacity
- D) Network delay

41. What does the acronym DNS stand for in networking?


- A) Domain Name System
- B) Data Networking Service
- C) Digital Name Server
- D) Domain Naming Service

42. What is the primary method used for connecting computers in a LAN?
- A) Optical fiber
- B) Copper cables
- C) Wireless connections
- D) Satellite connections

43. The main advantage of using a client-server architecture is:


- A) Peer resources are used equally
- B) Centralized control and management
- C) Decrease in local processing power required
- D) Simplicity in resource management
44. Methods of process communication in networking can include:
- A) Shared memory and message passing
- B) Batch processing and direct memory access
- C) Scheduling and indexing
- D) Paging and printing

45. Distributed systems are characterized by:


- A) Centralized control
- B) Resource sharing across different nodes
- C) Single user access
- D) Limited scalability

46. What is the main purpose of an API?


- A) To streamline user experiences
- B) To allow different software applications to communicate
- C) To manage device configurations
- D) To protect network from intrusions

47. In terms of data manipulation, the CPU architecture influences:


- A) Memory speed only
- B) Processing speed and efficiency of instructions
- C) The amount of data transferred
- D) Encryption methods

48. Serial communication is characterized by:


- A) Sending multiple bits at once
- B) Sending data one bit at a time
- C) Requires less complex circuitry
- D) Higher data transfer speeds

49. In parallel communication, which of the following is true?


- A) Data is transmitted in a single channel
- B) Multiple bits are sent simultaneously
- C) It is slower than serial communication
- D) Only one bit can be processed at any time

50. In a simple CPU architecture, which component is responsible for fetching and
decoding instructions?
- A) Memory unit
- B) Control unit
- C) Cache
- D) Input/Output unit

You might also like