Terms 4
Terms 4
A. DIMENSION A (9.9),B(9)
B. DIM A(9,9),B(9)
C. DIMENSION A(9,9),B(9)*
200 READ N$
A.15,1955,June,1955
A. IF.(I.GE.5) GO TO 7
B. IF (I,GE,5) GO TO 7
C. IF (I.GE.5)
D. IF (I.GE.5) GO TO 7 *
A. Flash media*
B. Tape drive
C. DVD
D. Floppy disk
DO 20 I=1,5
A(I)=5.8
I=5
20 CONTINUE
B. I cannot be an integer.
A. A(1,K)
B. A(H+J)
C. A(2*L-1)*
D. A(-3)
7. Sept 2022: A software program designed to enter a computer system, usually a network, through
security "holes" and then replicate itself.
A. Computer Virus
B. Worm *
c. Trojan Horse
D. HTTP
8. April 2022: What is the term for a deadlock situation that occurs when a program references a
difference page for almost every instruction and there is not even enough real memory to hold most of
the virtual memory?
A. Paging
B. Scanning
C. Thrashing *
D. Handshaking
680 DATA 33 40 60
800 END
A. line 670
B. line 680 *
C. line 690
D. line 700
10. Sept 2022: Which of the following is an instruction that causes data to be brought from memory into
an accumulation register?
A. LOAD *
B. LOOP
C. FETCH
D. JUMP
11. Find the value of J after executing the following program.
I=1
J=0
15 J=J**2+1**2
IF (LEQ.3) GO TO 16
I=I+1
GO TO 15
16 CONTINUE
A. 9
B. 15
C. 34*
D. 40
12. Sept 2022: An instruction that causes data in the accumulator to be moved to the memory or a
pheripheral register.
A. FETCH
B. STORE *
C. LOOP
D. LOAD
13. Find the values of X and Y after this program segment has been performed.
X=2
Y=4
Z=X
X=V
Y=Z
A. X=2, Y=4
B. X=4, Y=4
C. X=4, Y=2 *
D. X-2, Y=2
14. Sept 2022: In a spreadsheet (EXCEL), the number in cell A2 is set to 2. Then cell B2 is set to
A2*4/$A$2, where $ indicates the absolute cell address. This formula is copied into cells C2 and D2. The
number shown in cell D2 is
A. 2
B. 4
C. 8
D. 16 *
15. Sept 2022: Which of the following are NOT example of nonvolatile memory in the computer system?
A. Flash drives
B. RAMS *
C. Optical disk
D. Hard drives
17. Sept 2022: is a software that allows users to have fast and flexible access to information in large
documents, constructing associations among data items needed.
A. Voice mail
B. Internet
C. E-mail
D. Hypertext *
A=0
DO 77 I=1,4
77 A=A+I
A. 4
B. 5
C. 8
D. 10 *
19. April 2022: Matt is downloading an 800 kB file from the internet using his 28.8k modem. How long
will it take him to finish downloading?
A. 0.46 min
B. 3.7 min
C. 3.8 min*
D. 4.1 min
20. Which of the following would have to be added to the main program as a result of the variable XINCH
being changed to INCH? Before the change, the function is
FUNCTION FOOT(XINCH)
FOOT=XINCH/12.0
RETURN
END
A. a COMMON statement
B. a CALL statement
C. a DIMENSION specification
21. Sept 2021: Which of the following are used in designing ar.d documenting, complex processes-or
programs that help to visualize what Is going on and thereby help the viewer to understand a process or
algorithm?
A. Charts
B. Diagrams
C. Flowcharts*
D. Networks
22. Sept 2021: What is the standardized communication technique for expressing instructions to a
combuter?
A. flow chart
B. algorithn
C. programming language*
D. logic
23. In binary number, shifting the binary point one place to the right
A. multiples by 2 *
B. divides by 4
C. multiples 4
D. increases by 2
24. ____ gate is formed by inversion of the output of the AND gate.
A. XNOR
B. OR
C. NOR
D. NAND*
25. BCD code has always ___ bits per number.
A. 2
B. 4 *
C. 8
D. 16
26. Sept 2021: HTTP;// is an identifier that appears at the beginning of most Web page. What does HTTP
stands for?
A. open
B. close
C. disconnected
D. floating *
28. Sept 2021: Encryption can prov-de all of the following features of information systems security
EXCEPT ______.
A. confidentiality
B. integrity
C. authencity
D. privacy *
A. Controller
B. Buffer
C. Actuator
D. Accumulator *
30. An instruction that causes data in the A accumulator to be moved to the memory or a peripheral
register.
A. FETCH
B. STORE *
C. LOOP
D. LOAD
31. Which of these FORTRAN format specifications reads the input -567610 as -5676.10?
A. F6.2
B. F7.2
C. F7.3
D. F8.2 *
32. April 2022: As the simplex algorithm progress from one solution to the next in a linear programming
maximization problem, what will happen to the value of the object functions?
A. ribbon
B. bus *
C. wire wrap
D. multiplexed line
34 Which of the following is the language used in making an internet web page?
35. Sept 2022: A network of private computers infected with malicious software and controlled as a
group without owner's knowledge like sending spam messages.
A. Botnet *
C. Hacking
B. Phishing
D. Trojan horse