0 Vzor Informatics
0 Vzor Informatics
2. When transferring data from the hard disk to the main memory by the technique of
direct access, "the end of the data block transfer" event occurred. This event caused a
disruption, which belongs to the category of:
A. Internal, expected, nonmaskable
B. External, unexpected, synchronous
C. Expected, synchronous, nonmaskable
D. External, asynchronous, maskable
E. Unexpected, synchronous, nonmaskable
3. One of the following methods of representation is always used for the internal
representation of whole numbers with which arithmetic instructions operate:
A. Direct code or code with a shifted zero or a supplementary code
B. ASCII code or a direct code or a supplementary code.
C. A code with a fixed base point, or a code with a moveable base point or
UNICODE.
D. A supplementary code or a code with a shifted base point.
E. ASCII code or UNICODE.
4. The code words A, B, C are coded in a 5-bit code as follows: A(0 1 0 0 1), B(1 0 0 1 0)
and C(1 1 0 1 1). In order to make a code which codes only the words A, B, C,
self-correcting for a mistake in a single bit, it is necessary:
A. Expand it by an odd or even parity
B. Expand it by a total parity
C. Expand it by at least four suitably selected bits
D. Expand it by at least two suitably selected bits
E. No need to do anything, the code is self-correcting already.
7. If the input is a field or a flow of records on employees, which includes the basic
salary of the employee as positive whole number and if we want to determine
what percentage of the company’s employees earns a higher basic salary than the
average of the basic salary in this company, the structured algorithm solving this
task will include:
A. Two mutually embedded iterations (cycles) covering all employees, with the
selection based on the level of the salary inside the internal cycle
B. A sequence of two iterations (cycle) covering all employees, with the selection
embedded inside the second cycle
C. A selection, which will contain an iteration (cycle) covering all employees of
the company in both alternatives
D. A structured algorithm for the task solution does not exist because the input
does not contain sufficient information for obtaining a required output.
E. A structured algorithm will be realized by two parallel cycles, which will
include leaps between both cycles in dependence on the salary level of an
employee.
8. The disjunctive normal form of a logical equation f = ((a →b) ⊕ c) ∧ (a ∨ c) is:
(the symbol → marks an implication, symbol ⊕ “excludes or“ – XOR, ∧ a conjunction,
∨ a disjunction a – a negation)
A. We know the internal connection of the logical circuit and we search for the
Boole functions, which describes its inputs.
B. We know the disjunctive normal form of the circuit and we are searching for
its logical representation
C. We know the conjunctive normal form of the circuit and we are searching for
its logical representation
D. We know the Boole functions which describe the outputs of the logical circuit
and we are searching of its internal connections
E. We know the connections of the circuit and are searching for the disjunctive or
conjunctive normal forms of its outputs.
10. The following Table describes the behaviour of a logical circuit. Which one is it?
14. Access rights to file1 have been set by a command chmod 755 file1, which causes
a setting up of access rights to “rwxr-xr-x”. The file can be used by:
A. only its individual owner and superuser
B. only its individual owner or group owner
C. any user
D. only its group owner and superuser
E. only the superuser
15. When we can send the same report to two different objects, then the following is
valid about these objects:
16. When data classes of objects can be used for simplification of algorithms for the
search, sorting and SEQUENCING of values?
A. Integer, Boolean, Magnitude
B. File, Integer
C. Stream, Integer
D. Collection, Integer
E. Model, View, Controller
17. What can be stated about the relational data model in database systems
A. It allows the fastest obtaining answers to questions of all data models
B. It uses direct linkage of records in the memory between themselves
C. It is object oriented
D. It enables transaction processing as a single data model
E. The relational tables are linked only during the processing of the inquiry – this
slows down the computation
18. When we have all tables of the relational databases with a simple primary key in
the first normal form, then the following is valid:
20. We can state the following about the waterfall/cascade model of the life cycle of
the systems creation:
A. It is good for planning sources and it follows the process of the project
B. It is an obsolete mode of the information systems creation, which is now in
little use
C. It is a model which was developed for the object oriented creation of software
D. It allows more precise systems task by means of the prototypes implementation
E. It is ideal for utilization of the extreme programming technique.