Key FE Flashcards
The ________ model is the basis for today’s computers.
von Neumann
In a computer, the ________ subsystem stores data and programs.
memory
In a computer, the ________ subsystem performs calculations and
logical operations.
ALU
In a computer, the ________ subsystem accepts data and programs and
sends processing results to output devices.
input/output
In a computer, the ________ subsystem serves as a manager of the
other subsystems.
control unit
According to the von Neumann model, ________ are stored in memory.
data and programs
A step-by-step solution to a problem is called ________
an algorithm
FORTRAN and COBOL are examples of ________ .
computer languages
A 17th-century computing machine that could perform addition and
subtraction was the ________
Pascaline
________ is a set of instructions in a computer language that tells the
computer what to do with data.
A program
________ is the design and writing of a program in structured form.
Software engineering
The first electronic special-purpose computer was called ________
ABC
One of the first computers based on the von Neumann model was called ________ .
EDVAC
The first computing machine to use the idea of storage and
programming was called ________ .
the Jacquard loom
________ separated the programming task from computer operation tasks.
High-level programming languages
The base of the decimal number system is ________
10
The base of the binary number system is ________ .
2
The base of the octal number system is ________ .
8
The base of the hexadecimal number system is ________ .
16
When converting a decimal integer to base b, we repeatedly _______
. divide by
When converting a decimal fraction to base b, we repeatedly ________
multiply by
In a set of 64 symbols, each symbol requires a bit pattern length of
________ bits.
6
How many symbols can be represented by a bit pattern with ten bits?
1024
f the ASCII code for E is 1000101, then the ASCII code for e is
________ . Answer the question without consulting the ASCII table.
1100101
A 32-bit code called ________ represents symbols in all languages.
Unicode
An image can be represented in a computer using the ________ method.
either bitmap or vector graphic
In the ________ graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.
bitmap
In the ________ graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.
vector
In the ________ graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.
bitmap
When we want to store music in a computer, the audio signal must be ________ .
sampled, quantized, and coded
A floating-point value after normalization is (1.0101) ? 2?4. What is the value of exponent section in the Excess-127 representation?
123
Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system?
65535
Which number representation method is often used to store the
exponential value of a fractional part?
Excess
In an Excess conversion, we ________ the number to be converted.
add the bias number to
When a fractional part is normalized, the computer stores the ________
the sign, exponent, and mantissa
The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the ________
representation.
sign-and-magnitude
________ is an arithmetic operation.
Subtraction
________ is a logical bit operator.
exclusive OR, unary NOT, or binary AND
The ________ method of integer representation is the most common
method for storing integers in computer memory.
two’s complement
In two’s complement addition, if there is a final carry after the left most
column addition, ________ .
discard it
For an 8-bit allocation, the smallest decimal number that can be
represented in two’s complement form is ________
-128
For an 8-bit allocation, the largest decimal number that can be
represented in two’s complement form is ________
127
In two’s complement representation with a 4-bit allocation, we get
________ when we add 1 to 7.
-8
In two’s complement representation with a 4-bit allocation, we get
________ when we add 5 to 5.
-6
If the exponent in Excess_127 is binary 10000101, the exponent in
decimal is ________ .
6
If we are adding two numbers, one of which has an exponent value of 7
and the other an exponent value of 9, we need to shift the decimal point of the
smaller number ________ .
two places to the left
________ operator (s) takes two inputs to produce one output.
AND, OR, or XOR
The unary ________ operator inverts its single input.
NOT
________ operator (s), if the input is two 0s, the output is 0.
In AND, OR, or XOR
________ operator (s), if the input is two 1s, the output is 0.
In only XOR
For the binary AND operation, only an input of ________ gives an
output of 1.
two 1s
For the binary OR operation, only an input of ________ gives an output of 0.
two 0s
We use a bit pattern called a ________ to modify another bit pattern.
mask
To flip all the bits of a bit pattern, make a mask of all 1s and then
________ the bit pattern and the mask.
XOR
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s
and then ________ the bit pattern and the mask.
AND
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.
OR
The ________ is a computer subsystem that performs operations on
data.
CPU
________ is a stand-alone storage location that holds data temporarily.
A register
________ is a unit that can add two inputs.
An ALU
A register in a CPU can hold ________ .
data, instruction, or program counter values
A control unit with five wires can define up to ________ operations.
32
A word can be ________ bits.
8, or 16, or 32
If the memory address space is 16 MB and the word size is 8 bits, then________ bits are needed to access each word.
24
The data in ________ is erased if the computer is powered down.
RAM
________ is a memory type with capacitors that need to be refreshed periodically.
DRAM
________ is a memory type with traditional flip-flop gates to hold data.
SRAM
There are ________ bytes in 16 Terabytes.
2^16
________ can be programmed and erased using electronic impulses but can remain in a computer during erasure.
EEPROM
________ is a type of memory in which the user, not the manufacturer,
stores programs that cannot be overwritten.
PROM
Main memory in a computer usually consists of large amounts of________ speed memory.
low
A ________ is a storage device to which the user can write information only once.
CD-R
A ________ is a storage device that can undergo multiple writes and erasures.
CD-RW
The smallest storage area on a magnetic disk that can be accessed at one time is a ________ .
sector
If the memory has 232 words, the address bus needs to have ________ wires.
32
A control bus with eight wires can define ________ operations.
256
A ________ controller is a high-speed serial interface that transfers data in packets.
USB and FireWire
The three steps in the running of a program on a computer are
performed in the specific order ________ .
fetch, decode, and execute
In the ________ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.
programmed I/O
In the ________ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.
DMA
The TCP/IP model has ________ layers.
5
The ________ layer of the TCP/IP protocol suite provides services for end users.
application
The ________ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
physical
The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
data-link
The ________ layer of the TCP/IP protocol suite is responsible for
source-to-destination delivery of the entire message.
network
What is the domain name in the email address kayla@nasa.gov?
nasa.gov
Which physical topology uses a hub or switch?
star
IP addresses are currently ________ bits in length.
32
________ protocol (s) is one of the protocols in the transport layer.
TCP, UDP, and SCTP
________ is a protocol for email services.
SMTP
________ is a protocol for file transfer.
FTP
________ is a protocol for accessing and transferring documents on the WWW.
HTTP
________ is a program that facilitates the execution of other programs.
An operating system
________ supervises the activity of each component in a computer
system.
An operating system
________ is multi-programming with swapping.
Demand paging
________ is multi-programming without swapping.
Partitioning
In ________ , only one program can reside in memory for execution.
mono-programming
________ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.
Partitioning
In paging, a program is divided into equally sized sections called________ .
pages
In ________ , the program can be divided into differently sized sections.
demand segmentation
In ________ , the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.
demand paging
A process in the ________ state can go to either the ready, terminated, or waiting states.
running
A process in the ready state goes to the running state when ________ .
it gets access to the CPU
A program becomes a ________ when it is selected by the operating system and brought to the hold state.
job
Every process is ________ .
a job and a program
The ________ scheduler creates a process from a job and changes a process back to a job.
job
The ________ scheduler moves a process from one process state to another.
process
To prevent ________ , an operating system can put resource
restrictions on processes.
deadlock
________ can occur if a process has too many resource restrictions.
Starvation
The ________ manager is responsible for archiving and backup.
file
The ________ manager is responsible for access to I/O devices.
device
________ is a step-by-step method for solving a problem or doing a task.
An algorithm
There are ________ basic constructs in computer -science.
three
The ________ construct tests a condition.
decision
The ________ construct uses a set of actions one after another.
sequence
The ________ construct handles repeated actions.
repetition
________ is a pictorial representation of an algorithm.
A UML diagram
________ is an English-language-like representation of code.
Pseudocode
________ is a basic algorithm that adds a list of numbers.
Summation
________ is a basic algorithm that multiplies a list of numbers.
Product
________ is a basic algorithm that arranges data according to its value.
Sorting
The items are divided into two lists (sorted and unsorted) ________
sort.
in selection, bubble, or insertion
In ________ sort, the item that goes into the sorted list is always the first item in the unsorted list.
insertion
In ________ sort, the smallest item from the unsorted list is swapped with the item at the beginning of the unsorted list.
selection
In ________ sort, the smallest item moves to the beginning of the
unsorted list. There is no one-to-one swapping.
bubble
________ is a basic algorithm in which we want to find the location of a target in a list of items.
Searching
We use a ________ search for an unordered list.
sequential
We use a ________ search for an ordered list.
binary
________ is a process in which an algorithm calls itself.
Recursion
The only language understood by computer hardware is a ________ language.
machine
C, C++, and Java can be classified as ________ languages.
high-level
FORTRAN is a(n) ________ language.
procedural
Pascal is a(n) ________ language.
procedural
Java is a(n) ________ language.
object-oriented
LISP is a(n) ________ language.
functional
________ is a common language in the business -environment.
COBOL
________ is a popular object-oriented language.
Java
A ________ program can be either an application or an applet.
Java
LISP and Scheme are both ________ languages.
functional
Prolog is an example of a(n) ________ language.
declarative
One phase in system development is ________
analysis
Defining the users, requirements, and methods is part of the ________phase.
analysis
In the system development process, writing the program is part of the________ phase.
implementation
In the system development process, structure charts are tools used in the ________ phase.
design
Testing a software system can involve ________ testing.
both black-box and glass-box
________ is the breaking up of a large project into smaller parts.
Modularization
________ is a measure of how tightly two modules are bound to each other.
Coupling
________ between modules in a software system must be minimized.
Coupling
________ between modules in a software system must be maximized.
Cohesion
A data structure can be ________ .
an array, a record, or a linked list
An array that consists of just rows and columns is a ________ array.
two-dimensional
Each element in a record is called ________ .
a field
All the members of a record must be ________
related types
________ is an ordered collection of data in which each element
contains the location of the next element.
A linked list
In a linked list, each element contains ________
data and a link
The ________ is a pointer that identifies the next element in the linked list.
link
Given a linked list called children, the pointer variable children identifies
________ element of the linked list.
the first
An empty linked list consists of ________
a null head pointer
To traverse a list, you need a ________ pointer.
walking
In an abstract data type, ________ .
the ADT implementation is hidden
A stack is a ________ structure.
LIFO
A (n) ________ list is also known as a queue.
FIFO
If A is the first data element input into a stack, followed by B, C, and D,
then ________ is the first element to be removed.
D
If A is the first data element input into a queue, followed by B, C, and
D, then ________ is the first element to be removed
A
The pop operation ________ of the stack.
deletes an item from the top
The push operation ________ of the stack.
inserts an item at the top
In a binary tree, each node has ________ two subtrees.
at most
In preorder traversal of a binary tree, the ________
root is processed first
In ________ traversal of a binary tree, the right subtree is processed
inorder
In postorder traversal of a binary tree, the root is processed ________
last
In postorder traversal of a binary tree, the left subtree is processed________ .
first
In ________ traversal of a binary tree, the left subtree is processed
last.
preorder
In an inorder traversal of a binary tree, the root is processed ________.
second
________ file can be accessed randomly.
Any
________ file can be accessed sequentially.
A sequential
When a sequential file is updated, the ________ file gets the actual
update.
new master
When a sequential file is updated, the ________ file contains a list of all errors occurring during the update process.
error report
When a sequential file is updated, the ________ file contains the
changes to be applied
transaction
After a sequential file is updated, the ________ file contains the most current data.
new master
If the transaction file key is 20 and the first master file key is 25, then we ________ .
add the new record to the new master file
If the transaction file key is 20 with a delete code and the master file key is 20, then we ________ .
delete the data
An indexed file consists of ________
an index and random data file
The index of an indexed file has ________ fields.
two
In the ________ hashing method, selected digits are extracted from the key and used as the address.
digit extraction
In the ________ hashing method, the key is divided by the file size,
and the address is the remainder plus 1.
modulo division
In the ________ hashing method, there are no synonyms or collisions.
direct
________ are keys that hash to the same location in the data file.
Synonyms
When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a ________ .
collision
The address produced by a hashing algorithm is the ________
address.
home
The ________ area is the file area that contains all the home
addresses.
prime
In the ________ collision resolution method, we try to put data that cannot be placed in location 123 into location 124.
open addressing
In a three-level DBMS architecture, the layer that interacts directly with the hardware is the________ level.
internal
In a three-level DBMS architecture, the ________ level determines where data is actually stored on the storage devices.
internal
The ________ level of a three-level DBMS architecture defines the logical view of the data.
conceptual
The data model and the schema of a DBMS are often defined at the ________ level.
conceptual
In a three-level DBMS architecture, the ________ level interacts directly with the users.
external
Of the various database models, the ________ model is the most prevalent today.
relational
Each column in a relation is called ________ .
an attribute
Each row in a relation is called ________
a tuple
A unary operator is applied to ________ relation(s) and creates an output of ________ relation(s).
one, two
A binary operator is applied to ________ relation(s) and creates an output of ________ relation(s).
two, one
The unary ________ operation always results in a relation that has exactly one more row than the original relation.
insert
If you want to change the value of an attribute of a tuple, you use the ________ operation.
update
The operation that takes two relations and combines them based on common attributes is the ________ operation.
join
If you need to delete an attribute in a relation, you can use the ________ operation.
project
You want to create a relation called New that contains tuples that belong to both relation A and relation B. For this, you can use the ________ operation.
intersection
Which of the following is a unary operator?
Project
Which of the following is a binary operator?
difference
________ is a declarative language used on relational databases.
SQL
Data is compressed using a dictionary with indexes to strings. This is ________ .
Lempel Ziv encoding
A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ________ .
run-length encoding
In a ________ data compression method, the received data is an exact copy of the original message.
lossless
________ data compression method, the received data need not be an exact copy of the original message.
In MP3, JPEG, or MPEG
________ is an example of lossy compression.
JPEG
________ encoding is a lossless data compression method.
Huffman, run-length, or LZ
In ________ encoding, the more frequently occurring characters have shorter codes than the less frequently occurring characters.
Huffman
In ________ encoding, PPPPPPPPPPPPPPP can be replaced by P15.
run-length
LZ encoding requires ________ .
a dictionary, a buffer, and an algorithm
JPEG encoding involves ________ , a process that reveals the redundancies in a block.
the discrete cosine transform
In JPEG encoding, the ________ process breaks the original picture into smaller blocks and assigns a value to each pixel in a block.
blocking
The last step in JPEG, ________ , removes redundancies.
compression
________ is a lossy compression method for pictures and graphics, whereas ________ is a lossy compression method for video.
JPEG, MPEG
Which of the following is OSI layer of repeater?
Data Link
Network
Physical
Transport
Physical
An OS method of allowing multiple processes to share the CPU is: *
1/1
Time slicing
Multiuser
Multi Access
Multi purpose
Time slicing
Before a disk can be used, it must be: *
1/1
Erased and set up
Partitioned and formatted
Deleted and formatted
Erased and formatted
Partitioned and formatted
Which of the OSI layers is responsible for guaranteed delivery of data? *
1/1
Transport
Network
Data Link
Presentation
Data Link
The purpose of HTTP is to *
0/1
Format Web pages
Transfer Web pages
Transfer address
Transfer data
Transfer Web pages
In Windows , you can see the Task manager by using which of the following? *
1/1
Tab +Alt +Del key
Shift +Alt +Del key
Ctrl+Alt +Del key
Fn +Alt +Del key
Ctrl+Alt +Del key
Which type of guided medium is the least susceptible to attenuation and inductance? *
0/1
Coaxial cable
Copper wire
Fiber-optic cable
Golden wire
Fiber-optic cable
What is the positional value of the 7 in the base 8 number 2715? *
1/1
16
8
64
100
64
Which of the following is not one of the basic Boolean operators? *
1/1
AND
. OR
NOT
XOR
XOR
Which of the following is OSI layer of Router *
1/1
Data Link
Network
Physical
Transport
Network
DOS stands for: *
1/1
Demand Open Sources
Disk Operating System
Device Outer Shell
Direct Operating System
Disk Operating System
Which of the following is not a multitasking OS? *
1/1
Linux
UNIX
Windows
DOS
DOS
The process of arranges the disk’s surface into addressable areas and sets up the disk’s basic directory tree structure *
1/1
Partitioning
Set up
Booting
Formatting
Formatting
What binary value is equivalent to the hex number C43A? *
1/1
1100100100010110
1100110101111010
1100010000111010
1100001101011101
1100010000111010
Which part of the CPU is responsible for mathematical operations? *
1/1
CU
ALU
RLU
VLSI
ALU
What features of transistors made them superior for computers, compared with vacuum tubes? *
1/1
They were more expensive than tubes but lasted longer and were cooler in temperature.
They didn’t last as long as tubes but were less expensive.
They were cheaper and smaller than tubes.
They were cheaper, smaller, and cooler than tubes and lasted longer.
They were cheaper, smaller, and cooler than tubes and lasted longer.
Today, Microsoft considers its major competition in operating systems to be what system? *
0/1
Control Data Corporation OS
Sega Games operating system
Linux operating system
Mac OS X
Linux operating system
Linux operating system
High-speed __________________ is used to speed processing in a computer system *
0/1
Mass storage
Cache memory
ROM
Cache memory
Which of the following circuit types is used to create SRAM? *
1/1
Decoder
Flip-flop
LCD
ROM
Flip-flop
DSL speeds range from: *
1/1
256 Kbps to 1.5 Mbps
256 Mbps to 15 Mbps
56 Kbps to 256 Kbps
100 Kbps to 156 Kbps
256 Kbps to 1.5 Mbps
DSL is a combination of what two types of multiplexing? *
1/1
AM and FM
FDM and FM
AM and TDM
FDM and TDM
FDM and TDM
What is the binary equivalent of the decimal number 543? *
1/1
11111011110111
101100111
1011010011
1000011111
1000011111
A _______________ in computer terminology is a set of wires and protocols designed to facilitate data transfer *
1/1
Gate
Bus
Boolean circuit
CPU
Bus
Which of the following is not one of the OSI model layers? *
1/1
Data link
Wireless
Transport
Application
Wireless
The main level of a disk is called the: *
1/1
Root
Platform
Sector
Directory
Root
Internet Providers maintain a Switching center called a: *
0/1
End user
Internet
Point of Presence
Access point
Point of Presence
What is the positional value of the A in the hexadecimal number C4A6? *
1/1
10
16
160
100
16
What base 10 value is equivalent to 3C0D of base 16? *
1/1
32,767
15,373
68,536
10,125
15,373
Which topology has become more popular with the advent of the Internet and home networking? *
1/1
Token ring
Star
Bus
Ring
Star
Which type of memory can’t be written to easily? *
RAM
SRAM
ROM
Flip-flop
ROM
Which type of I/O processing is most efficient? *
0/1
Boolean
Polling
Logic
Interrupt
Interrupt
What numeric value in base 10 does the binary number 10000001 represent? *
1/1
119
139
129
None of the above
129
Which of the following is OSI layer of Switch? *
1/1
Data Link
Network
Physical
Transport
Data Link
What numeric value in hexadecimal is equivalent to the binary number 1101111010101101 *
1/1
BCAF
BE6C
6FAD
DEAD
DEAD
Which of the following standards is used in wireless networking? *
1/1
802.15
OSI
802.11
TCP
802.11
Which of the following memory types is the fastest? *
1/1
DRAM
ROM
XOR
SRAM
SRAM
What is the minimum number of bits required to represent 256 colors? *
0/1
4
8
16
32
16
Boolean expressions are simplified through the use of: *
0/1
Basic identities
Gate logic
Algebraic expressions
Specialized circuits
Algebraic expressions
The _______________ contains instructions and data that provide the startup program for a computer. *
1/1
RAM
DRAM
BIOS
CPU
BIOS
In Windows, the MD command must be used to create a folder *
1/1
True
False
False
Which of the following translates a program’s statements, one by one, into a language the computer can understand? *
1/1
Compiler
Interpreter
Translator
IDE
Interpreter
Which Internet component is responsible for decrementing the TTL field? *
1/1
Router
Switch
DNS
Gate way
Router
Which HTML tag is used to provide links to other pages? *
1/1
<HTTP>
<link></link>
<a>
<p>
</p></a></HTTP>
<a></a>
Which of the following converts source code into a computer language and results in an executable file *
1/1
Interpreter
Compiler
IDE
Translator
Compiler
Which of the following is not a responsibility of the file system? *
1/1
Creating files
Manipulating files
Renaming files
None of the above
None of the above
A … is a standard or typical example of how something might work, but without all the built-in functionality. *
1/1
Flowchart
Prototype
Design document
Data dictionary
Prototype
Which of the following protocols makes the Web possible? *
1/1
FTP
Telnet
HTTP
IP
HTTP
Which portion of the TCP/IP protocol suite provides error detection and correction *
1/1
TCP
IP
Both
Neither
TCP
Which is not included as a task of software engineering? *
1/1
Communicating with clients in meetings
Designing screens
Writing the application
Creating a design document
None of the above
None of the above
Which is not a type of control structure? *
1/1
Invocation
Top down
Algorithm
Selection
Algorithm
How many DNS servers does the Internet have? *
1/1
256
512
Thousands
Millions
Thousands
What is the set of possible values for a column? *
1/1
Index
Table
SQL
Domain
Domain
First normal DB form say *
1/1
No non key columns depend on another nonkey column
Every column that’s not part of the primary key is fully dependent on the primary key.
Eliminate repeated fields
All of the above
Eliminate repeated fields
Which of the following is not a valid DBMS? *
1/1
SQL Server
C++
Oracle
DB2
C++
Which is not a valid software development model? *
1/1
Waterfall
Degradation
Evolution
Spiral
Incremental
Degradation
A……. is a bot that actively reproduces itself across a network *
1/1
Virus
Trojan
Worm
None of the above
Worm
Use ……………………………..to protect everything Startup, e-mail, router, phone, PDA, screen saver *
1/1
Back up
passwords
locks
keys
passwords
Which of the following is not an Internet-related protocol? *
1/1
HTTP
HTML
FTP
TCP
HTML
………….. are uninvited guest programs on your computer with the potential to damage files and the operating system *
1/1
Virus
Worm
Bot
Troyjan
Virus
Which is not an advantage of using NTFS? *
1/1
Journaling
File encryption
Efficient disk use on small volumes
Security
Efficient disk use on small volumes
What uniquely identifies a row in a table? *
1/1
Index
Field
Primary key
Tuple
Primary key
How many IP addresses are presented to the Internet when NAT is used? *
1/1
1
16
3
64
1
How many possible ports are allowed in TCP? *
1/1
8
16
65,536
16,137,285
65,536
What is the standard port number for HTTP? *
1/1
16
32
64
80
80
A(n) __________ is a data structure consisting of contiguous memory locations *
1/1
Queue
Stack
Array
Tree
Array
A … is used as a visual model for describing a program’s logical steps *
1/1
Class diagram
Flowchart
Use case diagram
Design document
Flowchart
Which Internet protocol is used to assign IP addresses dynamically? *
1/1
TCP
DHCP
HTTP
DNS
DHCP
Which of the following SQL SELECT options is used to organize the data being returned? *
1/1
SORT BY
ORDER BY
WHERE
ARRANGE
ORDER BY
With _________ the microchip is organized so that a section of memory cells are erased in a single action. *
1/1
ROM
Flash
PROM
EEPROM
Flash
Which should not be included in the design document? *
1/1
Project objectives and requirements
Cost analysis
Feasibility study
Copies of screens and reports
None of the above
None of the above
Which is not an example of a high-level programming language? *
1/1
Ada
Assembly
C++
Java
Assembly
A design document is used as: *
1/1
A way to bill the client more
A blueprint that shows an application’s functionality
A replacement for pseudocode when writing a program
None of the above
A blueprint that shows an application’s functionality
Which of the following converts source code into a computer language and results in an executable file? *
1/1
Interpreter
Compiler
Translator
IDE
Compiler
Which is not a step of the database design process? *
1/1
Create the tables
Create the relationships
Investigate
Add the data
Add the data
Disk Defragmenter utility is used to *
1/1
reorganize tracks
minimize drive head movement?
minimize files
reorganize sector
minimize drive head movement?
What is a name used to identify a specific location and value in memory? *
1/1
Variable
Operator
Control structure
Object
Variable
The document responsible for describing the type of data stored in the database is called the *
1/1
Design document
Data dictionary
UML diagram
SDLC
Data dictionary
is a program that poses as an innocent program *
1/1
Worm
Bot
Trojan
Virus
Trojan
Which of the following is an example of a high-level protocol? *
1/1
TCP
IP
DHCP
SMTP
SMTP
Which is not a type of programming language? *
1/1
Low-level
Assembly
High-level
Machine
None of the above
None of the above