100% found this document useful (1 vote)
48 views

CSI106

Uploaded by

ngochuyen2k2lx
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
48 views

CSI106

Uploaded by

ngochuyen2k2lx
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

1.

(Choose 1 answer)
The personnel who deal with the computer & its management put together are called
A. Software
B. Humanware
C. Firmware
D. Hardware
E. None of the others

2. (Choose 1 answer)
FORTRAN and COBOL are examples of…..
A. Hardware
B. Operating systems
C. Computer languages
D. Algorithms

3. (Choose 1 answer)
……is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive

4. (Choose 1 answer)
What is the 80-20 rule in cache?
A. Most computers typically spend 80 percent of their time accessing only 20 percent of the
data
B. Cache memory at any time contains a copy of a portion of main memory.
C. It can hold data 20 percent to make access faster at least 80 percent of the time.
D. The CPU needs to check the cache first.

5. (Choose 1 answer)
A monitor's….. is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
A. Refresh rate
B. Dot pitch
C. Resolution
D. Color depth
E. None of the others

6. (Choose 1 answer)
What is taxonomy of computer organization?
A. SIMD - Single Instruction-stream, Multiple Data-stream
B. MISD - Multiple Instruction-stream, Single Data-stream
C. MIMD - Multiple Instruction-stream, Multiple Data-stream
D. All of the others

7. (Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

8. (Choose 1 answer)
The base of the hexadecimal number system is….
A. 2
B. 8
C. 10
D. 16

9. (Choose 1 answer)
Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the others

10. (Choose 1 answer)


The maximum value of an octal integer with K=2 digits is Nmax =......
A. 63
B. 64
C. 65
D. 66
E. None of the others

11. (Choose 1 answer)


Conversion of binary number 1010101000010111 to hexadecimal number is…..
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

12. (Choose 1 answer)


The precision of the fractional part of a number stored in a computer is defined by the…..
A. Sign
B. Exponent
C. Mantissa
D. Last digit

13. (Choose 1 answer)


Which of the following is the coding of data so that it can't be easily understood if
intercepted?
A. Barcode
B. Decoder
C. Encryption
D. Mnemonics
E. None of the others

14. (Choose 1 answer)


If we call the bit depth or number of bits per sample B, the number of samples per second S,
so how to calculate BIT RATE (R)?
A. B × 2S
B. 2B × S
C. B × S
D. B2 × S2

15. (Choose 1 answer)


In storing images, the samples are called (which stands for picture elements).
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others

16. (Choose 1 answer)


Use an arithmetic right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000

17. (Choose 1 answer)


……..is usually privately owned, limited in size and connects some hosts in a single office,
building, or campus.
A. LAN
B. WAN
C. Internet
D. Network

18. (Choose 1 answer)


In the physical layer, a ……can be broadly defined as anything that can carry information
from a source to a destination.
A. Digital-to-digital conversion
B. Analog-to-digital conversion
C. Digital-to-analog conversion
D. Analog-to-analog conversion
E. Transmission medium

19. (Choose 1 answer)


The……layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of
the entire message.
A. Transport
B. Network
C. Data-link
D. Session
20. (Choose 1 answer)
……protocol(s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP

21. (Choose 1 answer)


In a….., the directory system listing of the peers and what they offer uses the client-server
paradigm, but the storing and downloading of the files are done using the peer-to-peer
paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network

22. (Choose 4 answers)


The major design goals of an operating system: A. Efficient use of hardware and easy use
of resources
B. Control subsystems and manage memory
C. Access I/O device and CPU
D. Provide UI
E. Operation on data
F. Text editor

23. (Choose 1 answer)


A multi-programming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D. Use many operating systems
E. None of the others

24. (Choose 1 answer)


In….., only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging

25. (Choose 1 answer)


The…… scheduler creates a process from a job and changes a process back to a job.
A. Job
B. Process
C. Virtual
D. Queue

26. (Choose 1 answer)


What kind of state does a process execute until it needs I/O resources when I/O is
complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state

27. (Choose 1 answer)


The….. construct tests a condition.
A. Sequence
B. Decision
C. Repetition
D. Flow

28. (Choose 1 answer)


…..is an English-language-like representation of code.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm

29. (Choose 1 answer)


…..is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation

30. (Choose 1 answer)


In….. sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every

31. (Choose 1 answer)


A….. analyzer reads the source code symbol by symbol and creates a list of tokens in the
source language
A. Lexical
B. Syntax
C. Semantic
D. Code generation

32. (Choose 1 answer)


A notation used to express clearly on algorithm is known as
A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the others
33. (Choose 1 answer)
A. Procedural paradigm
In the….., we can think of a program as an active agent that manipulates passive objects.
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

34. (Choose 1 answer)


A………is a unit of code consisting of zero or more statements. It is also known as a block.
Example:
{
X = 1;
Y = 20;
}
A. Compound statement
B. Assignment statement
C. Control statement
D. None of others

35. (Choose 1 answer)


In a…. languages, the project team needs to choose a language or a set of languages from
among the procedural
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

36. (Choose 1 answer)


Defining the users, requirements, and methods is part of the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

37. (Choose 1 answer)


In the system development process, structure charts are tools used in the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

38. (Choose 1 answer)


What is quality referring to the ability to move data and/or a system from one platform to
another and to reuse code?
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability
39. (Choose 1 answer)
What is the method in black-box testing that a subset of values in the input domain is
selected for testing?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing

40. (Choose 1 answer)


What is the more common technique of two-dimensional arrays that can be stored in
memory?
A. Column-major storage
B. DMA
C. Isolated I/O
D. Row-major storage

41. (Choose 1 answer)


Each element in a record is called…..
A. A variable
B. An index
C. A field
D. A node

42. (Choose 1 answer)


Given a linked list called children, the pointer variable children identifies…. element of the
linked list.
A. The first
B. The second
C. The last
D. Any

43. (Choose 1 answer)


The push operation …. of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

44. (Choose 1 answer)


In….. of a binary tree we process all the children of a node before proceeding with the next
generation.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal

45. (Choose 1 answer)


The queue operation: "queue (queueName)" is used to….
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue

46. (Choose 1 answer)


In the sequential file we process the records one by one. After the operating system
processes the last record the ….. is detected and the loop is exited.
A. Hashed file
B. Sequential file
C. EOF
D. None of others

47. (Choose 1 answer)


In the ….. hashing method, the key is divided by the file size, and the address is the
remainder plus 1.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction

48. (Choose 1 answer)


….are provided by most operating systems for organizing files. This performs the same
function as a folder in a filing cabinet.
A. Operating system
B. Files
C. Binary files
D. Directories

49. (Choose 1 answer)


In a three-level DBMS architecture, the …..level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical

50. (Choose 1 answer)


In the network database model, the entities are organized in a ….in which some entities can
be accessed through several paths.
A. Graph
B. Tree
C. Array
D. Record

51. (Choose 1 answer)


Each column in a relation is called….
A. An attribute
B. A tuple
C. A union
D. An attitude
52. (Choose 1 answer)
The unary …. relation.operation always results in a relation that has exactly one more row
than the original.
A. Insert
B. Delete
C. Update
D. Select

53. (Choose 1 answer)


The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrators

54. (Choose 1 answer)


In the attacks threaten confidentiality based on…. they can obtain some other type of
information by monitoring online traffic.
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis

55. (Choose 1 answer)


Before transmission the sender transforms the plaintext into the ciphertext-this is…..
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

56. (Choose 1 answer)


….are unwanted programs that are hidden within other programs (host). When the user
executes the host program.
A. DoS
B. Trojan horses
C. Worms
D. Viruses

57. (Choose 1 answer)


Sending a virus to a computer is called an…..attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

58. (Choose 1 answer)


In a…. the relationship between a character in the plaintext to a character in the ciphertext is
one-to-many.
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher

59. (Choose 1 answer)


….ciphers are sometimes called public-key ciphers.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Private-key

60. (Choose 1 answer)


In a computer, the…. subsystem stores data and programs.
A. ALU
B. Input/output
C. Memory
D. Control unit

ĐÁP ÁN

1. B
2. C
3. B
4. A
5. B
6. D
7. B
8. D
9. B
10. A
11. C
12. C
13. C
14. C
15. B
16. B
17. A
18. E
19. A
20. D
21. C
22. A B C D
23. B
24. A
25. A
26. D
27. B
28. C
29. B
30. C
31. A
32. A
33. D
34. A
35. C
36. A
37. B
38. B
39. A
40. D
41. C
42. A
43. C
44. D
45. C
46. C
47. B
48. D
49. A
50. A
51. A
52. A
53. C
54. D
55. C
56. D
57. D
58. C
59. B
60. C

You might also like