CSI104
CSI104
Number: CSI-104
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
Sections
1. Introduction
2. Number Systems
3. Data Storage
4. Operations on Data
5. Computer Organization
6. Computer Network
7. Operating System
8. Algorithms
9. Programming Language
10. Software Engineering
11. Data Structure
12. Abstract Data Types
13. File Structure
14. Databases
15. Data Compression
16. Security
17. Theory of Computation
18. Artificial Intelligence
19. Introduction to Social Media
20. Social and Ethical Issues
Exam A
QUESTION 1
The _______ model is the basis for today’s computers.
A. Leibnitz
B. von Neumann
C. Pascal
D. Charles Babbage
Answer: B
Section: Introduction
Explanation/Reference:
QUESTION 2
In a computer, the _______ subsystem stores data and programs.
A. ALU
B. input/output
C. memory
D. control unit
Answer: C
Section: Introduction
Explanation/Reference:
QUESTION 3
In a computer, the _______ subsystem performs calculations and logical opera-tions.
A. ALU
B. input/output
C. memory
D. control unit
Answer: A
Section: Introduction
Explanation/Reference:
QUESTION 4
In a computer, the _______ subsystem accepts data and programs and sends pro-cessing results to output
devices.
A. ALU
B. input/output
C. memory
D. control unit
Answer: B
Section: Introduction
Explanation/Reference:
QUESTION 5
In a computer, the _______ subsystem serves as a manager of the other subsystems.
A. ALU
B. input/output
C. memory
D. control unit
Answer: D
Section: Introduction
Explanation/Reference:
QUESTION 6
According to the von Neumann model, _______ are stored in memory.
A. only data
B. only programs
C. data and programs
D. neither data nor programs
Answer: C
Section: Introduction
Explanation/Reference:
QUESTION 7
A step-by-step solution to a problem is called _______.
A. hardware
B. an operating system
C. a computer language
D. an algorithm
Answer: D
Section: Introduction
Explanation/Reference:
QUESTION 8
FORTRAN and COBOL are examples of _______.
A. hardware
B. operating systems
C. computer languages
D. algorithms
Answer: C
Section: Introduction
Explanation/Reference:
QUESTION 9
A 17th-century computing machine that could perform addition and subtraction was the _______.
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine
Answer: A
Section: Introduction
Explanation/Reference:
QUESTION 10
_______ is a set of instructions in a computer language that tells the computer what to do with data.
A. An operating system
B. An algorithm
C. A data processor
D. A program
Answer: D
Section: Introduction
Explanation/Reference:
QUESTION 11
_______ is the design and writing of a program in structured form.
A. Software engineering
B. Hardware engineering
C. Algorithm development
D. Instructional architecture
Answer: A
Section: Introduction
Explanation/Reference:
QUESTION 12
The first electronic special-purpose computer was called _______.
A. Pascal
B. Pascaline
C. ABC
D. ENIAC
Answer: C
Section: Introduction
Explanation/Reference:
QUESTION 13
One of the first computers based on the von Neumann model was called _______.
A. Pascal
B. Pascaline
C. ABC
D. EDVAC
Answer: D
Section: Introduction
Explanation/Reference:
QUESTION 14
The first computing machine to use the idea of storage and programming was called _______.
A. the Madeline
B. EDVAC
C. the Babbage machine
D. the Jacquard loom
Answer: D
Section: Introduction
Explanation/Reference:
QUESTION 15
_______ separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
Answer: C
Section: Introduction
Explanation/Reference:
Exam B
QUESTION 1
The base of the decimal number system is ____.
A. 2
B. 8
C. 10
D. 16
Answer: C
Section: Number Systems
Explanation/Reference:
QUESTION 2
The base of the binary number system is ____.
A. 2
B. 8
C. 10
D. 16
Answer: A
Section: Number Systems
Explanation/Reference:
QUESTION 3
The base of the octal number system is ____.
A. 2
B. 8
C. 10
D. 16
Answer: B
Section: Number Systems
Explanation/Reference:
QUESTION 4
The base of the hexadecimal number system is ____.
A. 2
B. 8
C. 10
D. 16
Answer: D
Section: Number Systems
Explanation/Reference:
QUESTION 5
When converting a decimal integer to base b, we repeatedly _____ b.
A. divide by
B. multiply by
C. add to
D. subtract from
Answer: A
Section: Number Systems
Explanation/Reference:
QUESTION 6
When converting a decimal fraction to base b, we repeatedly ____b.
A. divide by
B. multiply by
C. add to
D. subtract from
Answer: B
Section: Number Systems
Explanation/Reference:
QUESTION 7
Which of the following representations is erroneous?
A. Binary: 10111
B. Octal: 349
C. Hexa: 3AB
D. Decimal: 256
Answer: B
Section: Number Systems
Explanation/Reference:
QUESTION 8
Which of the following representations is erroneous?
A. Binary: 10211
B. Octal: 342
C. Hexa: EEE
D. Decimal: 145
Answer: A
Section: Number Systems
Explanation/Reference:
QUESTION 9
Which of the following representations is erroneous?
A. Binary: 111
B. Octal: 346
C. Hexa: EEG
D. Decimal: 221
Answer: C
Section: Number Systems
Explanation/Reference:
QUESTION 10
Which of the following representations is erroneous?
A. Binary: 110
B. Octal: 141
C. Hexa: EF
D. Decimal: 22A
Answer: D
Section: Number Systems
Explanation/Reference:
QUESTION 11
Which of the following is equivalent to 12 in decimal?
A. Binary: 1110
B. Octal: 15
C. Hexa: C
D. None of the other
Answer: C
Section: Number Systems
Explanation/Reference:
QUESTION 12
Which of the following is equivalent to 12 in decimal?
A. Binary: 11000
B. Octal: 31
C. Hexa: 1A
D. None of the other
Answer: A
Section: Number Systems
Explanation/Reference:
Exam C
QUESTION 1
A byte consists of _______ bits.
A. 2
B. 4
C. 8
D. 16
Answer: C
Section: Data Storage
Explanation/Reference:
QUESTION 2
In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.
A. 4
B. 5
C. 6
D. 7
Answer: C
Section: Data Storage
Explanation/Reference:
QUESTION 3
How many symbols can be represented by a bit pattern with ten bits?
A. 128
B. 256
C. 512
D. 1024
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 4
If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the question without
consulting the ASCII table.
A. 1000110
B. 1000111
C. 0000110
D. 1100101
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 5
A 32-bit code called _______ represents symbols in all languages.
A. ANSI
B. Unicode
C. EBCDIC
D. Extended ASCII
Answer: B
Section: Data Storage
Explanation/Reference:
QUESTION 6
An image can be represented in a computer using the _______ method.
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 7
In the _______ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.
A. bitmap
B. vector
C. quantized
D. binary
Answer: A
Section: Data Storage
Explanation/Reference:
QUESTION 8
In the _______ graphic method of representing an image in a computer, the image is decomposed into a
combination of geometrical figures.
A. bitmap
B. vector
C. quantized
D. binary
Answer: B
Section: Data Storage
Explanation/Reference:
QUESTION 9
In the _______ graphic method of representing an image in a computer, re-scaling of the image creates a
ragged or grainy image.
A. bitmap
B. vector
C. quantized
D. binary
Answer: A
Section: Data Storage
Explanation/Reference:
QUESTION 10
When we want to store music in a computer, the audio signal must be _______.
A. sampled only
B. quantized only
C. coded only
D. sampled, quantized, and coded
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 11
A floating-point value after normalization is (1.0101) x 2^(- 4).
What is the value of exponent section in the Excess-127 representation?
A. 4
B. -4
C. 127
D. 123
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 12
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this
system?
A. 17
B. 16
C. 65535
D. 65536
Answer: C
Section: Data Storage
Explanation/Reference:
QUESTION 13
Which number representation method is often used to store the exponential value of a fractional part?
A. unsigned integers
B. two's complement
C. Excess
D. ten's complement
Answer: C
Section: Data Storage
Explanation/Reference:
QUESTION 14
In an Excess conversion, we _______ the number to be converted.
Answer: A
Section: Data Storage
Explanation/Reference:
QUESTION 15
When a fractional part is normalized, the computer stores the _______.
Answer: D
Section: Data Storage
Explanation/Reference:
QUESTION 16
The precision of the fractional part of a number stored in a computer is defined by the _______.
A. sign
B. exponent
C. mantissa
D. last digit
Answer: C
Section: Data Storage
Explanation/Reference:
QUESTION 17
The combination of sign and mantissa of a real number in IEEE standard floating point format is stored as an
integer in the ____________ representation.
A. unsigned
B. sign and magnitude
C. two's complement
D. one's complement
Answer: B
Section: Data Storage
Explanation/Reference:
Exam D
QUESTION 1
_______ is an arithmetic operation.
A. The exclusive OR
B. The unary NOT
C. Subtraction
D. The binary AND
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 2
_______ is a logical bit operator.
A. The exclusive OR
B. The unary NOT
C. exclusive OR, unary NOT, or binary AND
D. The binary AND
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 3
The _______ method of integer representation is the most common method for storing integers in computer
memory.
A. sign-and-magnitude
B. one’s complement
C. two’s complement
D. unsigned integers
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 4
In two’s complement addition, if there is a final carry after the left most column addition, _______.
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 5
For an 8-bit allocation, the smallest decimal number that can be represented in two’s complement form is
_______.
A. -8
B. -127
C. -128
D. -256
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 6
For an 8-bit allocation, the largest decimal number that can be represented in two’s complement form is
_______.
A. 8
B. 127
C. 128
D. 256
Answer: B
Section: Operations on Data
Explanation/Reference:
QUESTION 7
In two’s complement representation with a 4-bit allocation, we get _______ when we add 1 to 7.
A. 8
B. 1
C. -7
D. -8
Answer: D
Section: Operations on Data
Explanation/Reference:
QUESTION 8
In two’s complement representation with a 4-bit allocation, we get _______ when we add 5 to 5.
A. -5
B. -6
C. -7
D. -10
Answer: B
Section: Operations on Data
Explanation/Reference:
QUESTION 9
If the exponent in Excess_127 is binary 10000101, the exponent in decimal is _______.
A. 6
B. 7
C. 8
D. 9
Answer: A
Section: Operations on Data
Explanation/Reference:
QUESTION 10
If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9,
we need to shift the decimal point of the smaller number _______.
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 11
_______ operator (s) takes two inputs to produce one output.
A. Only AND
B. Only OR
C. Only NOT
D. AND, OR, or NOT
Answer: D
Section: Operations on Data
Explanation/Reference:
QUESTION 12
The unary _______ operator inverts its single input.
A. AND
B. OR
C. NOT
D. XOR
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 13
_______ operator (s), if the input is two 0s, the output is 0.
A. In only AND
B. In only OR
C. In only XOR
D. In AND, OR, or XOR
Answer: D
Section: Operations on Data
Explanation/Reference:
QUESTION 14
_______ operator (s), if the input is two 1s, the output is 0.
A. In only AND
B. In only OR
C. In only XOR
D. In AND, OR, or XOR
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 15
For the binary AND operation, only an input of _______ gives an output of 1.
A. two 0s
B. two 1s
C. one 0 and one 1
D. two 2s
Answer: B
Section: Operations on Data
Explanation/Reference:
QUESTION 16
For the binary OR operation, only an input of _______ gives an output of 0.
A. two 0s
B. two 1s
C. one 0 and one 1
D. two 2s
Answer: A
Section: Operations on Data
Explanation/Reference:
QUESTION 17
We use a bit pattern called a _______ to modify another bit pattern.
A. mask
B. carry
C. float
D. byte
Answer: A
Section: Operations on Data
Explanation/Reference:
QUESTION 18
To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.
A. AND
B. OR
C. XOR
D. NOT
Answer: C
Section: Operations on Data
Explanation/Reference:
QUESTION 19
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then _______ the bit pattern and
the mask.
A. AND
B. OR
C. XOR
D. NOT
Answer: A
Section: Operations on Data
Explanation/Reference:
QUESTION 20
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the
mask.
A. AND
B. OR
C. XOR
D. NOT
Answer: B
Section: Operations on Data
Explanation/Reference:
Exam E
QUESTION 1
The _______ is a computer subsystem that performs operations on data.
A. CPU
B. memory
C. I/O hardward
D. bus system
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 2
_______ is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 3
_______ is a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D. A tape drive
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 4
A register in a CPU can hold _______.
A. only data
B. only instructions
C. only program counter values
D. data, instruction, or program counter values
Answer: D
Section: Computer Organization
Explanation/Reference:
QUESTION 5
A control unit with five wires can define up to _______ operations.
A. 5
B. 10
C. 25
D. 32
Answer: D
Section: Computer Organization
Explanation/Reference:
QUESTION 6
A word can be _______ bits.
A. only 8
B. only 16
C. only 32
D. 8, or 16, or 32
Answer: D
Section: Computer Organization
Explanation/Reference:
QUESTION 7
If the memory address space is 16 MB and the word size is 8 bits, then _______ bits are needed to access
each word.
A. 8
B. 16
C. 24
D. 32
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 8
The data in _______ is erased if the computer is powered down.
A. RAM
B. ROM
C. a tape drive
D. a CD-ROM
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 9
_______ is a memory type with capacitors that need to be refreshed periodically.
A. SRAM
B. DRAM
C. ROM
D. CROM
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 10
_______ is a memory type with traditional flip-flop gates to hold data.
A. SRAM
B. DRAM
C. ROM
D. CROM
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 11
There are _______ bytes in 16 Terabytes.
A. 2^16
B. 2^40
C. 2^44
D. 2^56
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 12
_______ can be programmed and erased using electronic impulses but can remain in a computer during
erasure.
A. ROM
B. PROM
C. EPROM
D. EEPROM
Answer: D
Section: Computer Organization
Explanation/Reference:
QUESTION 13
_______ is a type of memory in which the user, not the manufacturer, stores programs that cannot be
overwritten.
A. ROM
B. PROM
C. EPROM
D. EEPROM
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 14
Main memory in a computer usually consists of large amounts of ______ speed memory.
A. high
B. medium
C. low
D. very high speed
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 15
A _______ is a storage device to which the user can write information only once.
A. CD-ROM
B. CD-R
C. CD-RW
D. CD-RR
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 16
A _______ is a storage device that can undergo multiple writes and erasures.
A. CD-ROM
B. CD-R
C. CD-RW
D. CD-RR
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 17
The smallest storage area on a magnetic disk that can be accessed at one time is a _______.
A. track
B. sector
C. frame
D. head
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 18
If the memory has 2^32 words, the address bus needs to have _______ wires.
A. 8
B. 16
C. 32
D. 64
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 19
A control bus with eight wires can define _______ operations.
A. 8
B. 16
C. 256
D. 512
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 20
A _______ controller is a high-speed serial interface that transfers data in packets.
A. SCSI
B. USB
C. FireWire
D. USB and FireWire
Answer: D
Section: Computer Organization
Explanation/Reference:
QUESTION 21
The three steps in the running of a program on a computer are performed in the specific order _______.
Answer: C
Section: Computer Organization
Explanation/Reference:
QUESTION 22
In the _______ method for synchronizing the operation of the CPU with an I/O device, the I/O device informs
the CPU when it is ready for data transfer.
A. programmed I/O
B. interrupt-driven I/O
C. DMA
D. isolated I/O
Answer: B
Section: Computer Organization
Explanation/Reference:
QUESTION 23
In the _______ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/
O operation is finished.
A. programmed I/O
B. interrupt-driven I/O
C. DMA
D. isolated I/O
Answer: A
Section: Computer Organization
Explanation/Reference:
QUESTION 24
In the _______ method for synchronizing the operation of the CPU with an I/O device, a large block of data can
be passed from an I/O device to memory directly.
A. programmed I/O
B. interrupt-driven I/O
C. DMA
D. isolated I/O
Answer: C
Section: Computer Organization
Explanation/Reference:
Exam F
QUESTION 1
The TCP/IP model has _______ layers.
A. five
B. six
C. seven
D. eight
Answer: A
Section: Computer Network
Explanation/Reference:
QUESTION 2
The _______ layer of the TCP/IP protocol suite provides services for end users.
A. datalink
B. session
C. application
D. transport
Answer: C
Section: Computer Network
Explanation/Reference:
QUESTION 3
The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
A. datalink
B. transport
C. network
D. physical
Answer: D
Section: Computer Network
Explanation/Reference:
QUESTION 4
The _______ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two
adjacent nodes.
A. datalink
B. session
C. network
D. transport
Answer: A
Section: Computer Network
Explanation/Reference:
QUESTION 5
The _______ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire
message.
A. datalink
B. session
C. network
D. transport
Answer: C
Section: Computer Network
Explanation/Reference:
QUESTION 6
What is the domain name in the email address longnq9@fpt.edu.vn?
A. longnq9
B. longnq9@fpt.edu.vn
C. fpt.edu.vn
D. edu
Answer: C
Section: Computer Network
Explanation/Reference:
QUESTION 7
Which physical topology uses a hub or switch?
A. bus
B. ring
C. star
D. bus and ring
Answer: C
Section: Computer Network
Explanation/Reference:
QUESTION 8
IP addresses are currently _______ bits in length.
A. 4
B. 8
C. 32
D. 40
Answer: C
Section: Computer Network
Explanation/Reference:
QUESTION 9
_______ protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP and SCTP
Answer: D
Section: Computer Network
Explanation/Reference:
QUESTION 10
_______ is a protocol for file transfer.
A. FTP
B. SMTP
C. TELNET
D. HTTP
Answer: A
Section: Computer Network
Explanation/Reference:
QUESTION 11
_______ is a protocol for email services.
A. FTP
B. SMTP
C. TELNET
D. HTTP
Answer: B
Section: Computer Network
Explanation/Reference:
QUESTION 12
_______ is a protocol for accessing and transferring documents on the WWW.
A. FTP
B. SMTP
C. TELNET
D. HTTP
Answer: D
Section: Computer Network
Explanation/Reference:
Exam G
QUESTION 1
_______ is a program that facilitates the execution of other programs.
A. An operating system
B. Hardware
C. A queue
D. An application program
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 2
_______ supervises the activity of each component in a computer system.
A. An operating system
B. Hardware
C. A queue
D. An application program
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 3
Multi-programming requires a _______ operating-system.
A. batch
B. time-sharing
C. parallel
D. distributed
Answer: B
Section: Operating System
Explanation/Reference:
QUESTION 4
_______ is multi-programming with swapping.
A. Partitioning
B. Paging
C. Demand paging
D. Queuing
Answer: C
Section: Operating System
Explanation/Reference:
QUESTION 5
_______ is multi-programming without swapping.
A. Partitioning
B. Virtual memory
C. Demand paging
D. Queuing
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 6
In _______, only one program can reside in memory for execution.
A. mono-programming
B. multi-programming
C. partitioning
D. paging
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 7
_______ is a multi-programming method in which multiple programs are entirely in memory with each program
occupying a contiguous space.
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 8
In paging, a program is divided into equally sized sections called _______.
A. pages
B. frames
C. segments
D. partitions
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 9
In _______, the program can be divided into differently sized sections.
A. partitioning
B. paging
C. demand paging
D. demand segmentation
Answer: D
Section: Operating System
Explanation/Reference:
QUESTION 10
In _______, the program can be divided into equally sized sections called pages, but the pages need not be in
memory at the same time for execution.
A. partitioning
B. paging
C. demand paging
D. demand segmentation
Answer: C
Section: Operating System
Explanation/Reference:
QUESTION 11
A process in the _______ state can go to either the ready, terminated, or waiting states.
A. hold
B. virtual
C. running
D. hold or running
Answer: C
Section: Operating System
Explanation/Reference:
QUESTION 12
A process in the ready state goes to the running state when _______.
A. it enters memory
B. it requests I/O
C. it gets access to the CPU
D. it finishes running
Answer: C
Section: Operating System
Explanation/Reference:
QUESTION 13
A program becomes a _______ when it is selected by the operating system and brought to the hold state.
A. job
B. process
C. deadlock
D. partition
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 14
Every process is _______.
A. only a job
B. only a program
C. only a partition
D. a job and a program
Answer: D
Section: Operating System
Explanation/Reference:
QUESTION 15
The _______ scheduler creates a process from a job and changes a process back to a job.
A. job
B. process
C. virtual
D. queue
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 16
The _______ scheduler moves a process from one process state to another.
A. job
B. process
C. virtual
D. queue
Answer: B
Section: Operating System
Explanation/Reference:
QUESTION 17
To prevent _______, an operating system can put resource restrictions on processes.
A. starvation
B. synchronization
C. paging
D. deadlock
Answer: D
Section: Operating System
Explanation/Reference:
QUESTION 18
_______ can occur if a process has too many resource restrictions.
A. Starvation
B. Synchronization
C. Paging
D. Deadlock
Answer: A
Section: Operating System
Explanation/Reference:
QUESTION 19
The _______ manager is responsible for archiving and backup.
A. memory
B. process
C. device
D. file
Answer: D
Section: Operating System
Explanation/Reference:
QUESTION 20
The _______ manager is responsible for access to I/O devices.
A. memory
B. process
C. device
D. file
Answer: C
Section: Operating System
Explanation/Reference:
Exam H
QUESTION 1
_______ is a step-by-step method for solving a problem or doing a task.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
Answer: D
Section: Algorithms
Explanation/Reference:
QUESTION 2
There are ______ basic constructs in computer science.
A. one
B. two
C. three
D. four
Answer: C
Section: Algorithms
Explanation/Reference:
QUESTION 3
The _______construct tests a condition.
A. sequence
B. decision
C. repetition
D. flow
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 4
The _______ construct uses a set of actions one after another.
A. sequence
B. decision
C. repetition
D. flow
Answer: A
Section: Algorithms
Explanation/Reference:
QUESTION 5
The _______ construct handles repeated actions.
A. sequence
B. decision
C. repetition
D. flow
Answer: C
Section: Algorithms
Explanation/Reference:
QUESTION 6
_______ is a pictorial representation of an algorithm.
A. An UML diagram
B. A program
C. Pseudocode
D. An algorithm
Answer: A
Section: Algorithms
Explanation/Reference:
QUESTION 7
_______ is an English-language-like representation of code.
A. An UML diagram
B. A program
C. Pseudocode
D. An algorithm
Answer: C
Section: Algorithms
Explanation/Reference:
QUESTION 8
_______ is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
Answer: A
Section: Algorithms
Explanation/Reference:
QUESTION 9
_______ is a basic algorithm that multiplies a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 10
_______ is a basic algorithm that arranges data according to its value.
A. Inquiring
B. Sorting
C. Searching
D. Recursion
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 11
The items are divided into two lists (sorted and unsorted) _____ sort.
A. only in a selection
B. only in a bubble
C. only in an insertion
D. in selection, bubble, or insertion
Answer: D
Section: Algorithms
Explanation/Reference:
QUESTION 12
In _______ sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. selection
B. bubble
C. insertion
D. every
Answer: C
Section: Algorithms
Explanation/Reference:
QUESTION 13
In _______ sort, the smallest item from the unsorted list is swapped with the item at the beginning of the
unsorted list.
A. selection
B. bubble
C. insertion
D. every
Answer: A
Section: Algorithms
Explanation/Reference:
QUESTION 14
In ______ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
A. selection
B. bubble
C. insertion
D. every
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 15
_______ is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 16
We use a _______ search for an unordered list.
A. sequential
B. binary
C. bubble
D. insertion
Answer: A
Section: Algorithms
Explanation/Reference:
QUESTION 17
We use a _______ search for an ordered list.
A. sequential
B. binary
C. bubble
D. insertion
Answer: B
Section: Algorithms
Explanation/Reference:
QUESTION 18
_______ is a process in which an algorithm calls itself.
A. Insertion
B. Searching
C. Recursion
D. Iteration
Answer: C
Section: Algorithms
Explanation/Reference:
Exam I
QUESTION 1
The only language understood by computer hardware is a _______ language.
A. machine
B. symbolic
C. high level
D. natural
Answer: A
Section: Programming Language
Explanation/Reference:
QUESTION 2
C, C++, and Java can be classified as _______ languages.
A. machine
B. symbolic
C. high-level
D. natural
Answer: C
Section: Programming Language
Explanation/Reference:
QUESTION 3
FORTRAN is a(n) _______ language.
A. procedural
B. function
C. declarative
D. object oriented
Answer: A
Section: Programming Language
Explanation/Reference:
QUESTION 4
Pascal is a(n) _______ language.
A. procedural
B. functional
C. declarative
D. object oriented
Answer: A
Section: Programming Language
Explanation/Reference:
QUESTION 5
Java is a(n) _______ language.
A. procedural
B. functional
C. declarative
D. object-oriented
Answer: D
Section: Programming Language
Explanation/Reference:
QUESTION 6
LISP is a(n) _______ language.
A. procedural
B. functional
C. declarative
D. object-oriented
Answer: B
Section: Programming Language
Explanation/Reference:
QUESTION 7
_______ is a common language in the business environment.
A. FORTRAN
B. C++
C. C
D. COBOL
Answer: D
Section: Programming Language
Explanation/Reference:
QUESTION 8
_______ is a popular object-oriented language.
A. FORTRAN
B. COBOL
C. JAVA
D. LISP
Answer: C
Section: Programming Language
Explanation/Reference:
QUESTION 9
A _______ program can be either an application or an applet.
A. Fortran
B. C++
C. C
D. Java
Answer: D
Section: Programming Language
Explanation/Reference:
QUESTION 10
LISP and Scheme are both _______ languages.
A. procedural
B. functional
C. declarative
D. object oriented
Answer: B
Section: Programming Language
Explanation/Reference:
QUESTION 11
Prolog is an example of a(n) _______ language.
A. procedural
B. functional
C. declarative
D. object oriented
Answer: C
Section: Programming Language
Explanation/Reference:
Exam J
QUESTION 1
One phase in system development is _______.
A. analysis
B. application
C. designing
D. colleting
Answer: A
Section: Software Engineering
Explanation/Reference:
QUESTION 2
Defining the users, requirements, and methods is part of the _______ phase.
A. analysis
B. design
C. implementation
D. testing
Answer: A
Section: Software Engineering
Explanation/Reference:
QUESTION 3
In the system development process, writing the program is part of the _______ phase
A. analysis
B. design
C. implementation
D. testing
Answer: C
Section: Software Engineering
Explanation/Reference:
QUESTION 4
In the system development process, structure charts are tools used in the _______ phase.
A. analysis
B. design
C. implementation
D. testing
Answer: B
Section: Software Engineering
Explanation/Reference:
QUESTION 5
Testing a software system can involve _______ testing.
A. black box
B. glass box
C. neither black box nor glass box
D. both black box and glass box
Answer: D
Section: Software Engineering
Explanation/Reference:
QUESTION 6
_______ is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
Answer: D
Section: Software Engineering
Explanation/Reference:
QUESTION 7
_______ is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
Answer: B
Section: Software Engineering
Explanation/Reference:
QUESTION 8
_________between modules in a software system must be minimized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
Answer: A
Section: Software Engineering
Explanation/Reference:
QUESTION 9
_________between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
Answer: B
Section: Software Engineering
Explanation/Reference:
Exam K
QUESTION 1
A data structure can be _______.
A. only an array
B. only a record
C. only a linked list
D. an array, a record, or a linked list
Answer: D
Section: Data Structure
Explanation/Reference:
QUESTION 2
An array that consists of just rows and columns is a _______ array.
A. one-dimensional
B. two-dimensional
C. three-dimensional
D. multidimensional
Answer: B
Section: Data Structure
Explanation/Reference:
QUESTION 3
Each element in a record is called _______.
A. a variable
B. an index
C. a field
D. a node
Answer: C
Section: Data Structure
Explanation/Reference:
QUESTION 4
All the members of a record must be _______.
Answer: B
Section: Data Structure
Explanation/Reference:
QUESTION 5
_______ is an ordered collection of data in which each element contains the loca-tion of the next element.
A. An array
B. A record
C. A linked list
D. A file
Answer: C
Section: Data Structure
Explanation/Reference:
QUESTION 6
In a linked list, each element contains _______.
A. only data
B. only a link
C. neither data or a link
D. both data and link
Answer: D
Section: Data Structure
Explanation/Reference:
QUESTION 7
The _______ is a pointer that identifies the next element in the linked list.
A. link
B. node
C. array
D. data
Answer: A
Section: Data Structure
Explanation/Reference:
QUESTION 8
Given a linked list called children, the pointer variable children identifies ________ element of the linked list.
A. the first
B. the second
C. the last
D. any
Answer: A
Section: Data Structure
Explanation/Reference:
QUESTION 9
An empty linked list consists of _______.
A. A node
B. two nodes
C. data and a link
D. a null head pointer
Answer: D
Section: Data Structure
Explanation/Reference:
QUESTION 10
To traverse a list, you need a _______ pointer.
A. null
B. walking
C. beginning
D. insertion
Answer: B
Section: Data Structure
Explanation/Reference:
Exam L
QUESTION 1
In an abstract data type, _______.
Answer: B
Section: Abstract Data Types
Explanation/Reference:
QUESTION 2
A stack is a _________ structure.
A. FIFO
B. LIFO
C. DIFO
D. SIFO
Answer: B
Section: Abstract Data Types
Explanation/Reference:
QUESTION 3
A(n) _______ list is also known as a queue.
A. LIFO
B. FIFO
C. unordered
D. ordered
Answer: B
Section: Abstract Data Types
Explanation/Reference:
QUESTION 4
If A is the first data element input into a stack, followed by B, C, and D, then _______ is the first element to be
removed.
A. A
B. B
C. C
D. D
Answer: D
Section: Abstract Data Types
Explanation/Reference:
QUESTION 5
If A is the first data element input into a queue, followed by B, C, and D, then _______ is the first element to be
removed.
A. A
B. B
C. C
D. D
Answer: A
Section: Abstract Data Types
Explanation/Reference:
QUESTION 6
The pop operation _______ of the stack.
Answer: A
Section: Abstract Data Types
Explanation/Reference:
QUESTION 7
The push operation _______ of the stack.
Answer: C
Section: Abstract Data Types
Explanation/Reference:
QUESTION 8
In a binary tree, each node has _______ two subtrees.
A. more than
B. less than
C. at most
D. at least
Answer: D
Section: Abstract Data Types
Explanation/Reference:
QUESTION 9
In preorder traversal of a binary tree, the ______.
Answer: C
Section: Abstract Data Types
Explanation/Reference:
QUESTION 10
In _______ traversal of a binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postorder
D. any order
Answer: B
Section: Abstract Data Types
Explanation/Reference:
QUESTION 11
In postorder traversal of a binary tree, the root is processed _______.
A. first
B. second
C. last
D. after the left subtree
Answer: C
Section: Abstract Data Types
Explanation/Reference:
QUESTION 12
In postorder traversal of a binary tree, the left subtree is processed _______.
A. first
B. second
C. last
D. after the right subtree
Answer: A
Section: Abstract Data Types
Explanation/Reference:
QUESTION 13
In _______ traversal of a binary tree, the right subtree is processed last.
A. preorder
B. inorder
C. postoder
D. out of order
Answer: A
Section: Abstract Data Types
Explanation/Reference:
QUESTION 14
In an inorder traversal of a binary tree, the root is processed _______.
A. first
B. second
C. last
D. two times
Answer: B
Section: Abstract Data Types
Explanation/Reference:
Exam M
QUESTION 1
_______ file can be accessed randomly.
A. A sequential
B. An indexed
C. A hashed
D. Any
Answer: D
Section: File Structure
Explanation/Reference:
QUESTION 2
_______ file can be accessed sequentially.
A. A sequential
B. An indexed
C. A hashed
D. No
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 3
When a sequential file is updated, the ______ file gets the actual update.
A. new master
B. old master
C. transaction
D. error report
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 4
When a sequential file is updated, the ______ file contains a list of all errors occurring during the update
process.
A. new master
B. old master
C. transaction
D. error report
Answer: D
Section: File Structure
Explanation/Reference:
QUESTION 5
When a sequential file is updated, the ______ file contains the changes to be applied.
A. new master
B. old master
C. transaction
D. error report
Answer: C
Section: File Structure
Explanation/Reference:
QUESTION 6
After a sequential file is updated, the _______ file contains the most current data.
A. new master
B. old master
C. transaction
D. error report
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 7
If the transaction file key is 20 and the first master file key is 25, then we _______.
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 8
If the transaction file key is 20 with a delete code and the master file key is 20, then we _______.
Answer: C
Section: File Structure
Explanation/Reference:
QUESTION 9
An indexed file consists of _______.
Answer: D
Section: File Structure
Explanation/Reference:
QUESTION 10
The index of an indexed file has _______ fields.
A. two
B. three
C. four
D. any number of
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 11
In the _______ hashing method, selected digits are extracted from the key and used as the address.
A. direct
B. division remainder
C. modulo division
D. digit extraction
Answer: D
Section: File Structure
Explanation/Reference:
QUESTION 12
In the _______ hashing method, the key is divided by the file size, and the address is the remainder plus 1.
A. direct
B. modulo division
C. division remainder
D. digit extraction
Answer: B
Section: File Structure
Explanation/Reference:
QUESTION 13
In the _______ hashing method, there are no synonyms or collisions.
A. direct
B. modulo division
C. division remainder
D. digit extraction
Answer: A
Section: File Structure
Explanation/Reference:
QUESTION 14
_______ are keys that hash to the same location in the data file.
A. Collisions
B. Buckets
C. Synonyms
D. Linked lists
Answer: C
Section: File Structure
Explanation/Reference:
QUESTION 15
When a hashing algorithm produces an address for an insertion key and that ad-dress is already occupied, it is
called a _______.
A. collision
B. probe
C. synonym
D. linked list
Answer: D
Section: File Structure
Explanation/Reference:
Exam N
QUESTION 1
In a three-level DBMS architecture, the layer that interacts directly with the hardware is the _______ level.
A. external
B. conceptual
C. internal
D. physical
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 2
In a three-level DBMS architecture, the _______ level determines where data is actually stored on the storage
devices.
A. external
B. conceptual
C. internal
D. physical
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 3
The _______ level of a three-level DBMS architecture defines the logical view of the data.
A. external
B. conceptual
C. internal
D. physical
Answer: B
Section: Databases
Explanation/Reference:
QUESTION 4
The data model and the schema of a DBMS are often defined at the _______ level.
A. external
B. conceptual
C. internal
D. physical
Answer: B
Section: Databases
Explanation/Reference:
QUESTION 5
In a three-level DBMS architecture, the _______ level interacts directly with the users.
A. external
B. conceptual
C. internal
D. physical
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 6
Of the various database models, the _______ model is the most prevalent today.
A. hierarchical
B. network
C. relational
D. linked list
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 7
Each column in a relation is called _______.
A. an attribute
B. a tuple
C. a union
D. an attitude
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 8
Each row in a relation is called _______.
A. an attribute
B. a tuple
C. a union
D. an attitude
Answer: B
Section: Databases
Explanation/Reference:
QUESTION 9
A unary operator is applied to _______ relation(s) and creates an output of ________ relation(s).
A. one, one
B. one, two
C. two, one
D. two, two
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 10
A binary operator is applied to _______ relations (s) and creates an output of ________ relation(s).
A. one, one
B. one, two
C. two, one
D. two, two
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 11
The unary _______ operation always results in a relation that has exactly one more row than the original
relation.
A. insert
B. delete
C. update
D. select
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 12
If you want to change the value of an attribute of a tuple, you use the _______ operation.
A. project
B. join
C. update
D. select
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 13
The operation that takes two relations and combines them based on common attributes is the _________
operation.
A. project
B. join
C. union
D. intersection
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 14
If you need to delete an attribute in a relation, you can use the _______ operation.
A. project
B. join
C. union
D. intersection
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 15
You want to create a relation called New that contains tuples that belong to both relation A and relation B. For
this, you can use the _______ operation.
A. project
B. join
C. union
D. intersection
Answer: D
Section: Databases
Explanation/Reference:
QUESTION 16
Which of the following is a unary operator?
A. project
B. join
C. union
D. intersection
Answer: A
Section: Databases
Explanation/Reference:
QUESTION 17
Which of the following is a binary operator?
A. select
B. update
C. difference
D. all of the other
Answer: C
Section: Databases
Explanation/Reference:
QUESTION 18
_______ is a declarative language used on relational databases.
A. PDQ
B. SQL
C. LES
D. PBJ
Answer: C
Section: Databases
Explanation/Reference:
Exam O
QUESTION 1
Data is compressed using a dictionary with indexes to strings. This is __________ .
A. Huffman encoding
B. Lempel Ziv encoding
C. Morse coding
D. lossy coding
Answer: B
Section: Data Compression
Explanation/Reference:
QUESTION 2
A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ___.
A. Huffman encoding
B. Lempel Ziv encoding
C. Morse coding
D. run-length encoding
Answer: D
Section: Data Compression
Explanation/Reference:
QUESTION 3
___ is an example of lossy compression.
A. Huffman encoding
B. Lempel Ziv encoding
C. Morse coding
D. JPEG
Answer: D
Section: Data Compression
Explanation/Reference:
QUESTION 4
In a ___ data compression method, the received data is an exact copy of the original message.
A. lossless
B. lossy
C. MPEG
D. JPEG
Answer: A
Section: Data Compression
Explanation/Reference:
QUESTION 5
___ data compression method, the received data need not be an exact copy of the original message.
A. Only in MP3
B. Only in JPEG
C. Only in JPEG
D. In MP3, JPEG, or MPEG
Answer: D
Section: Data Compression
Explanation/Reference:
QUESTION 6
___ encoding is a lossless data compression method.
A. Only Huffman
B. Only Run-length
C. Only LZ
D. Huffman, run-length, or LZ
Answer: D
Section: Data Compression
Explanation/Reference:
QUESTION 7
In ___ encoding, the more frequently occurring characters have shorter codes than the less frequently
occurring characters.
A. Huffman
B. Run-length
C. LZ
D. JPEG
Answer: A
Section: Data Compression
Explanation/Reference:
QUESTION 8
In ___ encoding, PPPPPPPPPPPPPPP can be replaced by P15.
A. Huffman
B. Run-length
C. LZ
D. JPEG
Answer: B
Section: Data Compression
Explanation/Reference:
QUESTION 9
LZ encoding requires ___.
A. only a dictionary
B. only a buffer
C. only an algorithm
D. a dictionary, a buffer and an algorithm
Answer: D
Section: Data Compression
Explanation/Reference:
QUESTION 10
JPEG encoding involves ___, a process that reveals the redundancies in a block.
A. blocking
B. the discrete cosine transform
C. quantization
D. vectorization
Answer: B
Section: Data Compression
Explanation/Reference:
QUESTION 11
In JPEG encoding, the ___ process breaks the original picture into smaller blocks and assigns a value to each
pixel in a block.
A. blocking
B. the discrete cosine transform (DCT)
C. quantization
D. vectorization
Answer: A
Section: Data Compression
Explanation/Reference:
QUESTION 12
The last step in JPEG, ___, removes redundancies.
A. blocking
B. compression
C. quantization
D. vectorization
Answer: B
Section: Data Compression
Explanation/Reference:
QUESTION 13
___ is a lossy compression method for pictures and graphics, whereas ___ is a lossy compression method for
video.
A. DCT, MPEG
B. MPEG, JPEG
C. JPEG, MPEG
D. JPEG, DCT
Answer: C
Section: Data Compression
Explanation/Reference:
Exam P
QUESTION 1
Three security goals are _____.
Answer: C
Section: Security
Explanation/Reference:
QUESTION 2
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding
Answer: A
Section: Security
Explanation/Reference:
QUESTION 3
Which of the following attacks is threatening availability?
A. Replaying
B. Modification
C. Denial of service
D. Decoding
Answer: C
Section: Security
Explanation/Reference:
QUESTION 4
_____________ means concealing the contents of a message by enciphering.
A. Steganography
B. Cryptography
C. Compressing
D. Authentication
Answer: B
Section: Security
Explanation/Reference:
QUESTION 5
______________means concealing the message by covering it with something else.
A. Steganography
B. Cryptography
C. Compressing
D. Authentication
Answer: A
Section: Security
Explanation/Reference:
QUESTION 6
In __________cryptography, the same key is used by the sender and the receiver.
A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key
Answer: A
Section: Security
Explanation/Reference:
QUESTION 7
In _________ cryptography, the same key is used in both directions.
A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key
Answer: A
Section: Security
Explanation/Reference:
QUESTION 8
_________ cryptography is often used for long messages.
A. symmetric-key
B. asymmetric-key
C. public-key
D. open-key
Answer: A
Section: Security
Explanation/Reference:
QUESTION 9
___________ cryptography is often used for short messages.
A. symmetric-key
B. asymmetric-key
C. Secret-key
D. Open-key
Answer: B
Section: Security
Explanation/Reference:
QUESTION 10
__________means that the sender and the receiver expect confidentiality.
A. Nonrepudiation
B. Integrity
C. Authentication
D. encryption and decryption
Answer: D
Section: Security
Explanation/Reference:
QUESTION 11
___________ means that the data must arrive at the receiver exactly as they were sent.
A. Nonrepudiation
B. Message Integrity
C. Authentication
D. Secrecy
Answer: B
Section: Security
Explanation/Reference:
QUESTION 12
______________ can provide authentication, integrity, and nonrepudiation for a message.
A. Encryption/decryption
B. Digital signature
C. Compression
D. Key-exchange
Answer: B
Section: Security
Explanation/Reference:
QUESTION 13
In ___________, the identity of a party is verified once for the entire duration of system access.
A. entity authentication
B. message integrity
C. message authentication
D. message encryption
Answer: A
Section: Security
Explanation/Reference:
QUESTION 14
In __________ cryptography, everyone has access to everyone’s public key.
A. symmetric-key
B. asymmetric-key
C. secret-key
D. private-key
Answer: B
Section: Security
Explanation/Reference:
QUESTION 15
In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?
A. encryption key only
B. decryption key only
C. both encryption and decryption keys
D. neither encryption key nor decryption key
Answer: A
Section: Security
Explanation/Reference:
QUESTION 16
The RSA algorithm for confidentiality uses _______ cryptography.
A. asymmetric-key
B. symmetric-key
C. substitution
D. transposition
Answer: A
Section: Security
Explanation/Reference:
QUESTION 17
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key
of _______.
A. user A
B. user B
C. the network
D. a third party
Answer: B
Section: Security
Explanation/Reference:
QUESTION 18
The attack that reduces the capability of a computer is called a ________ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
Answer: B
Section: Security
Explanation/Reference:
QUESTION 19
Sending a virus to a computer is called an ________ attack.
A. penetration
B. denial of service
C. either a or b
D. neither a nor b
Answer: A
Section: Security
Explanation/Reference:
Exam Q
QUESTION 1
The _______ statement adds 1 to the variable.
A. increment
B. decrement
C. loop
D. complement
Answer: A
Section: Theory of Computation
Explanation/Reference:
QUESTION 2
The _______ statement repeats one or more actions.
A. increment
B. decrement
C. loop
D. complement
Answer: C
Section: Theory of Computation
Explanation/Reference:
QUESTION 3
The _______ statement subtracts 1 from the variable.
A. increment
B. decrement
C. loop
D. complement
Answer: B
Section: Theory of Computation
Explanation/Reference:
QUESTION 4
To clear a variable, we use the _______ statement(s).
A. increment
B. decrement
C. loop
D. decrement and loop
Answer: D
Section: Theory of Computation
Explanation/Reference:
QUESTION 5
To assign a number to a variable, we use the _______ statement(s).
A. increment
B. decrement
C. loop
D. decrement and loop
Answer: A
Section: Theory of Computation
Explanation/Reference:
QUESTION 6
To copy the value of one variable to another, we use the ____ statement(s).
A. increment
B. decrement
C. loop
D. increment, decrement and loop
Answer: D
Section: Theory of Computation
Explanation/Reference:
QUESTION 7
A Turing machine has these components: _______.
Answer: C
Section: Theory of Computation
Explanation/Reference:
QUESTION 8
In a Turing machine, the _______ holds a sequence of characters.
A. disk
B. tape
C. controller
D. read/write head
Answer: B
Section: Theory of Computation
Explanation/Reference:
QUESTION 9
The _______ is the theoretical counterpart of the CPU.
A. disk
B. tape
C. controller
D. read/write head
Answer: C
Section: Theory of Computation
Explanation/Reference:
QUESTION 10
The controller has _______ states.
A. three
B. four
C. a finite number of
D. an infinite number of
Answer: C
Section: Theory of Computation
Explanation/Reference:
QUESTION 11
A _______ is a pictorial representation of the states and their relationships to each other.
A. transition diagram
B. flowchart
C. transition table
D. Turing machine
Answer: A
Section: Theory of Computation
Explanation/Reference:
QUESTION 12
A _______ shows, among other things, the movement of the read/write head, the character read, and the
character written.
A. diagram
B. flowchart
C. transition table
D. Turing machine
Answer: C
Section: Theory of Computation
Explanation/Reference:
QUESTION 13
We use _______ to denote a program’s complexity.
Answer: B
Section: Theory of Computation
Explanation/Reference:
QUESTION 14
The complexity of a problem is O (log10 n) and the computer executes 1 million instructions per second. How
long does it take to run the program if the number of operations is 10,000?
A. 1 microsecond
B. 2 microseconds
C. 3 microseconds
D. 4 microseconds
Answer: D
Section: Theory of Computation
Explanation/Reference:
Exam R
QUESTION 1
The main foundation of thinking machines came from:
Answer: D
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 2
The term Artificial Intelligence (AI) was first coined by:
A. Steven Spielberg
B. Richard H. Richen
C. Alan Turing
D. John McCarthy
Answer: D
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 3
Two programing languages specifically designed for AI are:
A. C and C++
B. Java and C++
C. LISP and PROLOG
D. FORTRAN and COBOL
Answer: C
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 4
A node in semantic network becomes ______.
A. a slot in frames
B. an edge in frames
C. an object in frames
D. a line in frames
Answer: C
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 5
Which of the following is not a sentence in a propositional logic:
A. Ford is a car.
B. If John is home then Mary is at work.
C. True
D. Where is John?
Answer: D
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 6
To find the depth of an object, we use:
A. edge detection
B. segmentation
C. stereo vision
D. shading
Answer: C
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 7
To find the orientation of an object, we use:
A. motion
B. segmentation
C. stereo vision
D. texture
Answer: D
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 8
In language understanding, parsing a sentence is part of:
A. speech recognition
B. syntactic analysis
C. semantic analysis
D. pragmatic analysis
Answer: B
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 9
We use brute-force search:
Answer: A
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 10
In a biological neuron, the synapse:
Answer: C
Section: Artificial Intelligence
Explanation/Reference:
QUESTION 11
A perceptron:
A. is a biological neutron
B. is one of the parts of a biological neutron
C. is an artificial neutron
D. applies a weight on signals that pass through the neighboring neutron
Answer: C
Section: Artificial Intelligence
Explanation/Reference:
Exam S
QUESTION 1
In Facebook, friendship is a _______ relationship.
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
Answer: A
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 2
Communication in Facebook is a _________ relationship.
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
Answer: B
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 3
The home page in Facebook can be used __________.
Answer: C
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 4
To find friends in Facebook, the member can ______.
Answer: D
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 5
When you are in Facebook, you can ______.
A. post news
B. read news
C. neither post nor read news
D. both post and read news
Answer: D
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 6
In Twitter, a message can be ___________:
A. of any size
B. of maximum 100 characters
C. of maximum 140 characters
D. of maximum 200 characters
Answer: C
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 7
In Twitter, the relationship between member is based on:
A. friendship
B. following
C. either friendship or following
D. both friendship and following
Answer: B
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 8
In Twitter, follower-member is a ________ relationship.
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
Answer: C
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 9
In Twitter, communication between the sender and the receiver of a tweet is a ______________.
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
Answer: B
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 10
In Twitter, when a message is posted, __________
Answer: B
Section: Introduction to Social Media
Explanation/Reference:
QUESTION 11
In Twitter, ______________.
Explanation/Reference:
QUESTION 12
In Twitter, to refer to another tweet, you can use __________.
A. an ampersand
B. a hashtag
C. neither a nor b
D. either a or b
Answer: D
Section: Introduction to Social Media
Explanation/Reference:
Exam T
QUESTION 1
The ethical principle that measures the consequences of an act is referred to as ____________.
A. moral rules
B. utilization
C. social contract
D. none of the above
Answer: B
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 2
The ethical principle that dictates that a decision should be made according to the universally accepted
principles of morality is referred to as _________.
A. moral rules
B. utilization
C. social contract
D. none of the above
Answer: A
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 3
The ethical principle that dictates that an act is ethical when a majority of people in society agrees with it is
referred to as ______.
A. moral rules
B. utilization
C. social contract
D. none of the above
Answer: C
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 4
Which of the following is considered an intellectual property?
A. a trademark
B. a trade secret
C. a patent
D. all of the above
Answer: D
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 5
A company’s product or service is identified as a __________.
A. a trademark
B. a trade secret
C. a patent
D. copyright
Answer: A
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 6
A right to a written or created work is referred to as .
A. a trademark
B. a trade secret
C. a patent
D. copyright
Answer: D
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 7
Information about a product is that is kept secret by the owner is referred to as a__________.
A. a trademark
B. a trade secret
C. a patent
D. copyright
Answer: B
Section: Social and Ethical Issues
Explanation/Reference:
QUESTION 8
A right to a monopoly to use a piece of intellectual property is referred to as ________.
A. a trademark
B. a trade secret
C. a patent
D. copyright
Answer: C
Section: Social and Ethical Issues
Explanation/Reference: