Key FE Flashcards

1
Q

The ________ model is the basis for today’s computers.

A

von Neumann

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a computer, the ________ subsystem stores data and programs.

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a computer, the ________ subsystem performs calculations and
logical operations.

A

ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a computer, the ________ subsystem accepts data and programs and
sends processing results to output devices.

A

input/output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a computer, the ________ subsystem serves as a manager of the
other subsystems.

A

control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to the von Neumann model, ________ are stored in memory.

A

data and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A step-by-step solution to a problem is called ________

A

an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FORTRAN and COBOL are examples of ________ .

A

computer languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A 17th-century computing machine that could perform addition and
subtraction was the ________

A

Pascaline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a set of instructions in a computer language that tells the
computer what to do with data.

A

A program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ is the design and writing of a program in structured form.

A

Software engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first electronic special-purpose computer was called ________

A

ABC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the first computers based on the von Neumann model was called ________ .

A

EDVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first computing machine to use the idea of storage and
programming was called ________ .

A

the Jacquard loom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ separated the programming task from computer operation tasks.

A

High-level programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The base of the decimal number system is ________

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The base of the binary number system is ________ .

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The base of the octal number system is ________ .

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The base of the hexadecimal number system is ________ .

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When converting a decimal integer to base b, we repeatedly _______

A

. divide by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When converting a decimal fraction to base b, we repeatedly ________

A

multiply by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a set of 64 symbols, each symbol requires a bit pattern length of
________ bits.

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many symbols can be represented by a bit pattern with ten bits?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

f the ASCII code for E is 1000101, then the ASCII code for e is
________ . Answer the question without consulting the ASCII table.

A

1100101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A 32-bit code called ________ represents symbols in all languages.

A

Unicode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An image can be represented in a computer using the ________ method.

A

either bitmap or vector graphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In the ________ graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.

A

bitmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In the ________ graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.

A

vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In the ________ graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.

A

bitmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When we want to store music in a computer, the audio signal must be ________ .

A

sampled, quantized, and coded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A floating-point value after normalization is (1.0101) ? 2?4. What is the value of exponent section in the Excess-127 representation?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system?

A

65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which number representation method is often used to store the
exponential value of a fractional part?

A

Excess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In an Excess conversion, we ________ the number to be converted.

A

add the bias number to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When a fractional part is normalized, the computer stores the ________

A

the sign, exponent, and mantissa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the ________
representation.

A

sign-and-magnitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

________ is an arithmetic operation.

A

Subtraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

________ is a logical bit operator.

A

exclusive OR, unary NOT, or binary AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The ________ method of integer representation is the most common
method for storing integers in computer memory.

A

two’s complement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In two’s complement addition, if there is a final carry after the left most
column addition, ________ .

A

discard it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

For an 8-bit allocation, the smallest decimal number that can be
represented in two’s complement form is ________

A

-128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

For an 8-bit allocation, the largest decimal number that can be
represented in two’s complement form is ________

A

127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In two’s complement representation with a 4-bit allocation, we get
________ when we add 1 to 7.

A

-8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In two’s complement representation with a 4-bit allocation, we get
________ when we add 5 to 5.

A

-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

If the exponent in Excess_127 is binary 10000101, the exponent in
decimal is ________ .

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

If we are adding two numbers, one of which has an exponent value of 7
and the other an exponent value of 9, we need to shift the decimal point of the
smaller number ________ .

A

two places to the left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

________ operator (s) takes two inputs to produce one output.

A

AND, OR, or XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The unary ________ operator inverts its single input.

A

NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

________ operator (s), if the input is two 0s, the output is 0.

A

In AND, OR, or XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

________ operator (s), if the input is two 1s, the output is 0.

A

In only XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

For the binary AND operation, only an input of ________ gives an
output of 1.

A

two 1s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

For the binary OR operation, only an input of ________ gives an output of 0.

A

two 0s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

We use a bit pattern called a ________ to modify another bit pattern.

A

mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

To flip all the bits of a bit pattern, make a mask of all 1s and then
________ the bit pattern and the mask.

A

XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s
and then ________ the bit pattern and the mask.

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.

A

OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The ________ is a computer subsystem that performs operations on
data.

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

________ is a stand-alone storage location that holds data temporarily.

A

A register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

________ is a unit that can add two inputs.

A

An ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A register in a CPU can hold ________ .

A

data, instruction, or program counter values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A control unit with five wires can define up to ________ operations.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A word can be ________ bits.

A

8, or 16, or 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

If the memory address space is 16 MB and the word size is 8 bits, then________ bits are needed to access each word.

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

The data in ________ is erased if the computer is powered down.

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

________ is a memory type with capacitors that need to be refreshed periodically.

A

DRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

________ is a memory type with traditional flip-flop gates to hold data.

A

SRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

There are ________ bytes in 16 Terabytes.

A

2^16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

________ can be programmed and erased using electronic impulses but can remain in a computer during erasure.

A

EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

________ is a type of memory in which the user, not the manufacturer,
stores programs that cannot be overwritten.

A

PROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Main memory in a computer usually consists of large amounts of________ speed memory.

A

low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A ________ is a storage device to which the user can write information only once.

A

CD-R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A ________ is a storage device that can undergo multiple writes and erasures.

A

CD-RW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The smallest storage area on a magnetic disk that can be accessed at one time is a ________ .

A

sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

If the memory has 232 words, the address bus needs to have ________ wires.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A control bus with eight wires can define ________ operations.

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A ________ controller is a high-speed serial interface that transfers data in packets.

A

USB and FireWire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The three steps in the running of a program on a computer are
performed in the specific order ________ .

A

fetch, decode, and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

In the ________ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.

A

programmed I/O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

In the ________ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.

A

DMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The TCP/IP model has ________ layers.

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

The ________ layer of the TCP/IP protocol suite provides services for end users.

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The ________ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.

A

data-link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The ________ layer of the TCP/IP protocol suite is responsible for
source-to-destination delivery of the entire message.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is the domain name in the email address kayla@nasa.gov?

A

nasa.gov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which physical topology uses a hub or switch?

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

IP addresses are currently ________ bits in length.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

________ protocol (s) is one of the protocols in the transport layer.

A

TCP, UDP, and SCTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

________ is a protocol for email services.

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

________ is a protocol for file transfer.

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

________ is a protocol for accessing and transferring documents on the WWW.

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

________ is a program that facilitates the execution of other programs.

A

An operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

________ supervises the activity of each component in a computer
system.

A

An operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

________ is multi-programming with swapping.

A

Demand paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

________ is multi-programming without swapping.

A

Partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

In ________ , only one program can reside in memory for execution.

A

mono-programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

________ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.

A

Partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

In paging, a program is divided into equally sized sections called________ .

A

pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

In ________ , the program can be divided into differently sized sections.

A

demand segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In ________ , the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.

A

demand paging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

A process in the ________ state can go to either the ready, terminated, or waiting states.

A

running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A process in the ready state goes to the running state when ________ .

A

it gets access to the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A program becomes a ________ when it is selected by the operating system and brought to the hold state.

A

job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Every process is ________ .

A

a job and a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

The ________ scheduler creates a process from a job and changes a process back to a job.

A

job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

The ________ scheduler moves a process from one process state to another.

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

To prevent ________ , an operating system can put resource
restrictions on processes.

A

deadlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

________ can occur if a process has too many resource restrictions.

A

Starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

The ________ manager is responsible for archiving and backup.

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

The ________ manager is responsible for access to I/O devices.

A

device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

________ is a step-by-step method for solving a problem or doing a task.

A

An algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

There are ________ basic constructs in computer -science.

A

three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

The ________ construct tests a condition.

A

decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

The ________ construct uses a set of actions one after another.

A

sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

The ________ construct handles repeated actions.

A

repetition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

________ is a pictorial representation of an algorithm.

A

A UML diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

________ is an English-language-like representation of code.

A

Pseudocode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

________ is a basic algorithm that adds a list of numbers.

A

Summation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

________ is a basic algorithm that multiplies a list of numbers.

A

Product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

________ is a basic algorithm that arranges data according to its value.

A

Sorting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

The items are divided into two lists (sorted and unsorted) ________
sort.

A

in selection, bubble, or insertion

122
Q

In ________ sort, the item that goes into the sorted list is always the first item in the unsorted list.

A

insertion

123
Q

In ________ sort, the smallest item from the unsorted list is swapped with the item at the beginning of the unsorted list.

A

selection

124
Q

In ________ sort, the smallest item moves to the beginning of the
unsorted list. There is no one-to-one swapping.

A

bubble

125
Q

________ is a basic algorithm in which we want to find the location of a target in a list of items.

A

Searching

126
Q

We use a ________ search for an unordered list.

A

sequential

127
Q

We use a ________ search for an ordered list.

A

binary

128
Q

________ is a process in which an algorithm calls itself.

A

Recursion

129
Q

The only language understood by computer hardware is a ________ language.

A

machine

130
Q

C, C++, and Java can be classified as ________ languages.

A

high-level

131
Q

FORTRAN is a(n) ________ language.

A

procedural

132
Q

Pascal is a(n) ________ language.

A

procedural

133
Q

Java is a(n) ________ language.

A

object-oriented

134
Q

LISP is a(n) ________ language.

A

functional

135
Q

________ is a common language in the business -environment.

A

COBOL

136
Q

________ is a popular object-oriented language.

A

Java

137
Q

A ________ program can be either an application or an applet.

A

Java

138
Q

LISP and Scheme are both ________ languages.

A

functional

139
Q

Prolog is an example of a(n) ________ language.

A

declarative

140
Q

One phase in system development is ________

A

analysis

141
Q

Defining the users, requirements, and methods is part of the ________phase.

A

analysis

142
Q

In the system development process, writing the program is part of the________ phase.

A

implementation

143
Q

In the system development process, structure charts are tools used in the ________ phase.

A

design

144
Q

Testing a software system can involve ________ testing.

A

both black-box and glass-box

145
Q

________ is the breaking up of a large project into smaller parts.

A

Modularization

146
Q

________ is a measure of how tightly two modules are bound to each other.

A

Coupling

147
Q

________ between modules in a software system must be minimized.

A

Coupling

148
Q

________ between modules in a software system must be maximized.

A

Cohesion

149
Q

A data structure can be ________ .

A

an array, a record, or a linked list

150
Q

An array that consists of just rows and columns is a ________ array.

A

two-dimensional

151
Q

Each element in a record is called ________ .

A

a field

152
Q

All the members of a record must be ________

A

related types

153
Q

________ is an ordered collection of data in which each element
contains the location of the next element.

A

A linked list

154
Q

In a linked list, each element contains ________

A

data and a link

155
Q

The ________ is a pointer that identifies the next element in the linked list.

A

link

156
Q

Given a linked list called children, the pointer variable children identifies
________ element of the linked list.

A

the first

157
Q

An empty linked list consists of ________

A

a null head pointer

158
Q

To traverse a list, you need a ________ pointer.

A

walking

159
Q

In an abstract data type, ________ .

A

the ADT implementation is hidden

160
Q

A stack is a ________ structure.

A

LIFO

161
Q

A (n) ________ list is also known as a queue.

A

FIFO

162
Q

If A is the first data element input into a stack, followed by B, C, and D,
then ________ is the first element to be removed.

A

D

163
Q

If A is the first data element input into a queue, followed by B, C, and
D, then ________ is the first element to be removed

A

A

164
Q

The pop operation ________ of the stack.

A

deletes an item from the top

165
Q

The push operation ________ of the stack.

A

inserts an item at the top

166
Q

In a binary tree, each node has ________ two subtrees.

A

at most

167
Q

In preorder traversal of a binary tree, the ________

A

root is processed first

168
Q

In ________ traversal of a binary tree, the right subtree is processed

A

inorder

169
Q

In postorder traversal of a binary tree, the root is processed ________

A

last

170
Q

In postorder traversal of a binary tree, the left subtree is processed________ .

A

first

171
Q

In ________ traversal of a binary tree, the left subtree is processed
last.

A

preorder

172
Q

In an inorder traversal of a binary tree, the root is processed ________.

A

second

173
Q

________ file can be accessed randomly.

A

Any

174
Q

________ file can be accessed sequentially.

A

A sequential

175
Q

When a sequential file is updated, the ________ file gets the actual
update.

A

new master

176
Q

When a sequential file is updated, the ________ file contains a list of all errors occurring during the update process.

A

error report

177
Q

When a sequential file is updated, the ________ file contains the
changes to be applied

A

transaction

178
Q

After a sequential file is updated, the ________ file contains the most current data.

A

new master

179
Q

If the transaction file key is 20 and the first master file key is 25, then we ________ .

A

add the new record to the new master file

180
Q

If the transaction file key is 20 with a delete code and the master file key is 20, then we ________ .

A

delete the data

181
Q

An indexed file consists of ________

A

an index and random data file

182
Q

The index of an indexed file has ________ fields.

A

two

183
Q

In the ________ hashing method, selected digits are extracted from the key and used as the address.

A

digit extraction

184
Q

In the ________ hashing method, the key is divided by the file size,
and the address is the remainder plus 1.

A

modulo division

185
Q

In the ________ hashing method, there are no synonyms or collisions.

A

direct

186
Q

________ are keys that hash to the same location in the data file.

A

Synonyms

187
Q

When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a ________ .

A

collision

188
Q

The address produced by a hashing algorithm is the ________
address.

A

home

189
Q

The ________ area is the file area that contains all the home
addresses.

A

prime

190
Q

In the ________ collision resolution method, we try to put data that cannot be placed in location 123 into location 124.

A

open addressing

191
Q

In a three-level DBMS architecture, the layer that interacts directly with the hardware is the________ level.

A

internal

192
Q

In a three-level DBMS architecture, the ________ level determines where data is actually stored on the storage devices.

A

internal

193
Q

The ________ level of a three-level DBMS architecture defines the logical view of the data.

A

conceptual

194
Q

The data model and the schema of a DBMS are often defined at the ________ level.

A

conceptual

195
Q

In a three-level DBMS architecture, the ________ level interacts directly with the users.

A

external

196
Q

Of the various database models, the ________ model is the most prevalent today.

A

relational

197
Q

Each column in a relation is called ________ .

A

an attribute

198
Q

Each row in a relation is called ________

A

a tuple

199
Q

A unary operator is applied to ________ relation(s) and creates an output of ________ relation(s).

A

one, two

200
Q

A binary operator is applied to ________ relation(s) and creates an output of ________ relation(s).

A

two, one

201
Q

The unary ________ operation always results in a relation that has exactly one more row than the original relation.

A

insert

202
Q

If you want to change the value of an attribute of a tuple, you use the ________ operation.

A

update

203
Q

The operation that takes two relations and combines them based on common attributes is the ________ operation.

A

join

204
Q

If you need to delete an attribute in a relation, you can use the ________ operation.

A

project

205
Q

You want to create a relation called New that contains tuples that belong to both relation A and relation B. For this, you can use the ________ operation.

A

intersection

206
Q

Which of the following is a unary operator?

A

Project

207
Q

Which of the following is a binary operator?

A

difference

208
Q

________ is a declarative language used on relational databases.

A

SQL

209
Q

Data is compressed using a dictionary with indexes to strings. This is ________ .

A

Lempel Ziv encoding

210
Q

A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ________ .

A

run-length encoding

211
Q

In a ________ data compression method, the received data is an exact copy of the original message.

A

lossless

212
Q

________ data compression method, the received data need not be an exact copy of the original message.

A

In MP3, JPEG, or MPEG

213
Q

________ is an example of lossy compression.

A

JPEG

214
Q

________ encoding is a lossless data compression method.

A

Huffman, run-length, or LZ

215
Q

In ________ encoding, the more frequently occurring characters have shorter codes than the less frequently occurring characters.

A

Huffman

216
Q

In ________ encoding, PPPPPPPPPPPPPPP can be replaced by P15.

A

run-length

217
Q

LZ encoding requires ________ .

A

a dictionary, a buffer, and an algorithm

218
Q

JPEG encoding involves ________ , a process that reveals the redundancies in a block.

A

the discrete cosine transform

219
Q

In JPEG encoding, the ________ process breaks the original picture into smaller blocks and assigns a value to each pixel in a block.

A

blocking

220
Q

The last step in JPEG, ________ , removes redundancies.

A

compression

221
Q

________ is a lossy compression method for pictures and graphics, whereas ________ is a lossy compression method for video.

A

JPEG, MPEG

222
Q

Which of the following is OSI layer of repeater?
Data Link
Network
Physical
Transport

A

Physical

223
Q

An OS method of allowing multiple processes to share the CPU is: *
1/1
Time slicing
Multiuser
Multi Access
Multi purpose

A

Time slicing

224
Q

Before a disk can be used, it must be: *
1/1
Erased and set up
Partitioned and formatted
Deleted and formatted
Erased and formatted

A

Partitioned and formatted

225
Q

Which of the OSI layers is responsible for guaranteed delivery of data? *
1/1
Transport
Network
Data Link
Presentation

A

Data Link

226
Q

The purpose of HTTP is to *
0/1
Format Web pages
Transfer Web pages
Transfer address
Transfer data

A

Transfer Web pages

227
Q

In Windows , you can see the Task manager by using which of the following? *
1/1
Tab +Alt +Del key
Shift +Alt +Del key
Ctrl+Alt +Del key
Fn +Alt +Del key

A

Ctrl+Alt +Del key

228
Q

Which type of guided medium is the least susceptible to attenuation and inductance? *
0/1
Coaxial cable
Copper wire
Fiber-optic cable
Golden wire

A

Fiber-optic cable

229
Q

What is the positional value of the 7 in the base 8 number 2715? *
1/1
16
8
64
100

A

64

230
Q

Which of the following is not one of the basic Boolean operators? *
1/1
AND
. OR
NOT
XOR

A

XOR

231
Q

Which of the following is OSI layer of Router *
1/1
Data Link
Network
Physical
Transport

A

Network

232
Q

DOS stands for: *
1/1
Demand Open Sources
Disk Operating System
Device Outer Shell
Direct Operating System

A

Disk Operating System

233
Q

Which of the following is not a multitasking OS? *
1/1
Linux
UNIX
Windows
DOS

A

DOS

234
Q

The process of arranges the disk’s surface into addressable areas and sets up the disk’s basic directory tree structure *
1/1
Partitioning
Set up
Booting
Formatting

A

Formatting

235
Q

What binary value is equivalent to the hex number C43A? *
1/1
1100100100010110
1100110101111010
1100010000111010
1100001101011101

A

1100010000111010

236
Q

Which part of the CPU is responsible for mathematical operations? *
1/1
CU
ALU
RLU
VLSI

A

ALU

237
Q

What features of transistors made them superior for computers, compared with vacuum tubes? *
1/1
They were more expensive than tubes but lasted longer and were cooler in temperature.
They didn’t last as long as tubes but were less expensive.
They were cheaper and smaller than tubes.
They were cheaper, smaller, and cooler than tubes and lasted longer.

A

They were cheaper, smaller, and cooler than tubes and lasted longer.

238
Q

Today, Microsoft considers its major competition in operating systems to be what system? *
0/1
Control Data Corporation OS
Sega Games operating system
Linux operating system
Mac OS X

A

Linux operating system

239
Q

Linux operating system
High-speed __________________ is used to speed processing in a computer system *
0/1
Mass storage
Cache memory
ROM

A

Cache memory

240
Q

Which of the following circuit types is used to create SRAM? *
1/1
Decoder
Flip-flop
LCD
ROM

A

Flip-flop

241
Q

DSL speeds range from: *
1/1
256 Kbps to 1.5 Mbps
256 Mbps to 15 Mbps
56 Kbps to 256 Kbps
100 Kbps to 156 Kbps

A

256 Kbps to 1.5 Mbps

242
Q

DSL is a combination of what two types of multiplexing? *
1/1
AM and FM
FDM and FM
AM and TDM
FDM and TDM

A

FDM and TDM

243
Q

What is the binary equivalent of the decimal number 543? *
1/1
11111011110111
101100111
1011010011
1000011111

A

1000011111

244
Q

A _______________ in computer terminology is a set of wires and protocols designed to facilitate data transfer *
1/1
Gate
Bus
Boolean circuit
CPU

A

Bus

245
Q

Which of the following is not one of the OSI model layers? *
1/1
Data link
Wireless
Transport
Application

A

Wireless

246
Q

The main level of a disk is called the: *
1/1
Root
Platform
Sector
Directory

A

Root

247
Q

Internet Providers maintain a Switching center called a: *
0/1
End user
Internet
Point of Presence
Access point

A

Point of Presence

248
Q

What is the positional value of the A in the hexadecimal number C4A6? *
1/1
10
16
160
100

A

16

249
Q

What base 10 value is equivalent to 3C0D of base 16? *
1/1
32,767
15,373
68,536
10,125

A

15,373

250
Q

Which topology has become more popular with the advent of the Internet and home networking? *
1/1
Token ring
Star
Bus
Ring

A

Star

251
Q

Which type of memory can’t be written to easily? *
RAM
SRAM
ROM
Flip-flop

A

ROM

252
Q

Which type of I/O processing is most efficient? *
0/1
Boolean
Polling
Logic
Interrupt

A

Interrupt

253
Q

What numeric value in base 10 does the binary number 10000001 represent? *
1/1
119
139
129
None of the above

A

129

254
Q

Which of the following is OSI layer of Switch? *
1/1
Data Link
Network
Physical
Transport

A

Data Link

255
Q

What numeric value in hexadecimal is equivalent to the binary number 1101111010101101 *
1/1
BCAF
BE6C
6FAD
DEAD

A

DEAD

256
Q

Which of the following standards is used in wireless networking? *
1/1
802.15
OSI
802.11
TCP

A

802.11

257
Q

Which of the following memory types is the fastest? *
1/1
DRAM
ROM
XOR
SRAM

A

SRAM

258
Q

What is the minimum number of bits required to represent 256 colors? *
0/1
4
8
16
32

A

16

259
Q

Boolean expressions are simplified through the use of: *
0/1
Basic identities
Gate logic
Algebraic expressions
Specialized circuits

A

Algebraic expressions

260
Q

The _______________ contains instructions and data that provide the startup program for a computer. *
1/1
RAM
DRAM
BIOS
CPU

A

BIOS

261
Q

In Windows, the MD command must be used to create a folder *
1/1
True
False

A

False

262
Q

Which of the following translates a program’s statements, one by one, into a language the computer can understand? *
1/1
Compiler
Interpreter
Translator
IDE

A

Interpreter

263
Q

Which Internet component is responsible for decrementing the TTL field? *
1/1
Router
Switch
DNS
Gate way

A

Router

264
Q

Which HTML tag is used to provide links to other pages? *
1/1

<HTTP>
<link></link>
<a>
<p>
</p></a></HTTP>

A

<a></a>

265
Q

Which of the following converts source code into a computer language and results in an executable file *
1/1
Interpreter
Compiler
IDE
Translator

A

Compiler

266
Q

Which of the following is not a responsibility of the file system? *
1/1
Creating files
Manipulating files
Renaming files
None of the above

A

None of the above

267
Q

A … is a standard or typical example of how something might work, but without all the built-in functionality. *
1/1
Flowchart
Prototype
Design document
Data dictionary

A

Prototype

268
Q

Which of the following protocols makes the Web possible? *
1/1
FTP
Telnet
HTTP
IP

A

HTTP

269
Q

Which portion of the TCP/IP protocol suite provides error detection and correction *
1/1
TCP
IP
Both
Neither

A

TCP

270
Q

Which is not included as a task of software engineering? *
1/1
Communicating with clients in meetings
Designing screens
Writing the application
Creating a design document
None of the above

A

None of the above

271
Q

Which is not a type of control structure? *
1/1
Invocation
Top down
Algorithm
Selection

A

Algorithm

272
Q

How many DNS servers does the Internet have? *
1/1
256
512
Thousands
Millions

A

Thousands

273
Q

What is the set of possible values for a column? *
1/1
Index
Table
SQL
Domain

A

Domain

274
Q

First normal DB form say *
1/1
No non key columns depend on another nonkey column
Every column that’s not part of the primary key is fully dependent on the primary key.
Eliminate repeated fields
All of the above

A

Eliminate repeated fields

275
Q

Which of the following is not a valid DBMS? *
1/1
SQL Server
C++
Oracle
DB2

A

C++

276
Q

Which is not a valid software development model? *
1/1
Waterfall
Degradation
Evolution
Spiral
Incremental

A

Degradation

277
Q

A……. is a bot that actively reproduces itself across a network *
1/1
Virus
Trojan
Worm
None of the above

A

Worm

278
Q

Use ……………………………..to protect everything Startup, e-mail, router, phone, PDA, screen saver *
1/1
Back up
passwords
locks
keys

A

passwords

279
Q

Which of the following is not an Internet-related protocol? *
1/1
HTTP
HTML
FTP
TCP

A

HTML

280
Q

………….. are uninvited guest programs on your computer with the potential to damage files and the operating system *
1/1
Virus
Worm
Bot
Troyjan

A

Virus

281
Q

Which is not an advantage of using NTFS? *
1/1
Journaling
File encryption
Efficient disk use on small volumes
Security

A

Efficient disk use on small volumes

282
Q

What uniquely identifies a row in a table? *
1/1
Index
Field
Primary key
Tuple

A

Primary key

283
Q

How many IP addresses are presented to the Internet when NAT is used? *
1/1
1
16
3
64

A

1

284
Q

How many possible ports are allowed in TCP? *
1/1
8
16
65,536
16,137,285

A

65,536

285
Q

What is the standard port number for HTTP? *
1/1
16
32
64
80

A

80

286
Q

A(n) __________ is a data structure consisting of contiguous memory locations *
1/1
Queue
Stack
Array
Tree

A

Array

287
Q

A … is used as a visual model for describing a program’s logical steps *
1/1
Class diagram
Flowchart
Use case diagram
Design document

A

Flowchart

288
Q

Which Internet protocol is used to assign IP addresses dynamically? *
1/1
TCP
DHCP
HTTP
DNS

A

DHCP

289
Q

Which of the following SQL SELECT options is used to organize the data being returned? *
1/1
SORT BY
ORDER BY
WHERE
ARRANGE

A

ORDER BY

290
Q

With _________ the microchip is organized so that a section of memory cells are erased in a single action. *
1/1
ROM
Flash
PROM
EEPROM

A

Flash

291
Q

Which should not be included in the design document? *
1/1
Project objectives and requirements
Cost analysis
Feasibility study
Copies of screens and reports
None of the above

A

None of the above

292
Q

Which is not an example of a high-level programming language? *
1/1
Ada
Assembly
C++
Java

A

Assembly

293
Q

A design document is used as: *
1/1
A way to bill the client more
A blueprint that shows an application’s functionality
A replacement for pseudocode when writing a program
None of the above

A

A blueprint that shows an application’s functionality

294
Q

Which of the following converts source code into a computer language and results in an executable file? *
1/1
Interpreter
Compiler
Translator
IDE

A

Compiler

295
Q

Which is not a step of the database design process? *
1/1
Create the tables
Create the relationships
Investigate
Add the data

A

Add the data

296
Q

Disk Defragmenter utility is used to *
1/1
reorganize tracks
minimize drive head movement?
minimize files
reorganize sector

A

minimize drive head movement?

297
Q

What is a name used to identify a specific location and value in memory? *
1/1
Variable
Operator
Control structure
Object

A

Variable

298
Q

The document responsible for describing the type of data stored in the database is called the *
1/1
Design document
Data dictionary
UML diagram
SDLC

A

Data dictionary

299
Q

is a program that poses as an innocent program *
1/1
Worm
Bot
Trojan
Virus

A

Trojan

300
Q

Which of the following is an example of a high-level protocol? *
1/1
TCP
IP
DHCP
SMTP

A

SMTP

301
Q

Which is not a type of programming language? *
1/1
Low-level
Assembly
High-level
Machine
None of the above

A

None of the above