0% found this document useful (0 votes)
4 views

source csi (2)

Uploaded by

caotuan01122005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

source csi (2)

Uploaded by

caotuan01122005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Question: 1

(Choose 1 answer)
The personnel who deals with the computer & its management put together are called
A. Software
B. Humanware
C. Firmware
D. Hardware
E. None of the others

Question: 2
(Choose 1 answer)
FORTRAN and COBOL are examples of…..
A. Hardware
B. Operating systems
C. Computer languages
D. Algorithms

Question: 3
(Choose 1 answer)
……is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive

Question: 4
(Choose 1 answer)
What is the 80-20 rule in cache?
A. Most computers typically spend 80 percent of their time accessing only 20 percent of the data
B. Cache memory at any time contains a copy of a portion of main memory.
C. It can hold data 20 percent to make access faster at least 80 percent of the time.
D. The CPU need to checks the cache first.

Question: 5
(Choose 1 answer)
A monitor's….. is the distance between the holes in the mask behind the screen. This helps determine
how sharp the dots appear.
A. Refresh rate
B. Dot pitch
C. Resolution
D. Color depth
E. None of the others

Question: 6
(Choose 1 answer)
What is taxonomy of computer organization?
A. SIMD - Single Instruction-stream, Multiple Data-stream
B. MISD - Multiple Instruction-stream, Single Data-stream
C. MIMD - Multiple Instruction-stream, Multiple Data-stream
D. All of others
Question: 7
(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

Question: 8
(Choose 1 answer)
The base of the hexadecimal number system is….
A. 2
B. 8
C. 10
D. 16

Question: 9 (Choose 1 answer)


Which of the following is equivalent to 12 in decimal?
Α. (1110)2
B. (C)16
C. (15)8
D. None of the others

Question: 10
(Choose 1 answer)
The maximum value of an octal integer with K=2 digits is Nmax =......
A. 63
B. 64
C. 65
D. 66
E. None of the others

Question: 11
(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is…..
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

Question: 12
(Choose 1 answer)
The precision of the fractional part of a number stored in a computer is defined by the…..
A. Sign
B. Exponent
C. Mantissa
D. Last digit
Question: 13
(Choose 1 answer)
Which of the following is the coding of data so that it can't be easily understood if intercepted?
A. Barcode
B. Decoder
C. Encryption
D. Mnemonics
E. None of the others

Question: 14
(Choose 1 answer)
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how
to calculate BIT RATE (R)?
A. B\times2S
B. 2B\times S
C. BxS
D. B2\times S2

Question: 15
(Choose 1 answer)
In the storing images, the samples are called (which stands for picture elements).
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others

Question: 16
(Choose 1 answer)
Use a arithmetic right shift operation on the bit pattern 1001 1000
Α. 0100 1100
Β. 1100 1100
C. 1101 1001
D. 1001 1000

Question: 17
(Choose 1 answer)
……..is usually privately owned, limited in size and connects some hosts in a single office, building, or
campus.
A. LAN
B. WAN
C. Internet
D. Network

Question: 18
(Choose 1 answer)
In physical layer, a ……can be broadly defined as anything that can carry information from a source to
a destination.
A. Digital-to-digital conversion
B. Analog-to-digital conversion
C. Digital-to-analog conversion
D. Analog-to-analog conversion
E. Transmission medium

Question: 19
(Choose 1 answer)
The……layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire
message.
A. Transport
B. Network
C. Data-link
D. Session

Question: 20
(Choose 1 answer)
……protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP

Question: 21 (Choose 1 answer)


In a….. the directory system listing of the peers and what they offer uses the client-server paradigm,
but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network

Question: 22
(Choose 4 answers)
The major design goals of an operating system:
A. Efficient use of hardware and easy use of resources
B. Control subsystems and manage memory
C. Access I/O device and CPU
D. Provide UI
E. Operation on data
F. Text editor

Question: 23
(Choose 1 answer)
A multi programming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D. Use many operating systems
E. None of the others

Question: 24
(Choose 1 answer)
In….. only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging
Question: 25
(Choose 1 answer)
The…… scheduler creates a process from a job and changes a process back to a job.
A. Job
B. Process
C. Virtual
D. Queue

Question: 26 (Choose 1 answer)


What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state

Question: 27
(Choose 1 answer)
The….. construct tests a condition.
A. Sequence
B. Decision
C. Repetition
D. Flow

Question: 28
(Choose 1 answer)
…..is an English-language-like representation of code.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm

Question: 29
(Choose 1 answer)
…..is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation

Question: 30
(Choose 1 answer)
In….. sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every

Question: 31
(Choose 1 answer)
A….. analyzer reads the source code symbol by symbol and creates a list of tokens in the source
language
A. Lexical
B. Syntax
C. Semantic
D. Code generation

Question: 32
(Choose 1 answer)
A notation used to express clearly on algorithm is known as
A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the others

Question: 33
(Choose 1 answer)
A. Procedural paradigm
In the….. we can think of a program as an active agent that manipulates passive objects.
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

Question 34:

A. Compound statement
B. Assignment statement
C. Control statement
D. None of others

Question: 35
(Choose 1 answer)
In a…. languages the project team needs to choose a language or a set of languages from among the
procedural
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

Question: 36
(Choose 1 answer)
Defining the users, requirements, and methods is part of the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

Question: 37
(Choose 1 answer)
In the system development process, structure charts are tools used in the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

Question: 38
(Choose 1 answer)
What is quality referring to the ability to move data and/or a system from one platform to another and
to reuse code?
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability

Question: 39
(Choose 1 answer)
What is the method in black-box testing that a subset of values in the input domain is selected for
testing?.
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing

Question: 40
(Choose 1 answer)
What is more common technique of two-dimensional arrays that can be stored in memory?
A. Column-major storage
B. DMA
C. Isolated I/O
D. Row-major storage

Question: 41
(Choose 1 answer)
Each element in a record is called…..
A. A variable
B. An index
C. A field
D. A node

Question: 42
(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies…. element of the linked list.
A. The first
B. The second
C. The last
D. Any

Question: 43
(Choose 1 answer)
The push operation …. of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

Question: 44 (Choose 1 answer)


In….. of a binary tree we process all the children of a node before proceeding with the next generation
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal

Question: 45
(Choose 1 answer)
The queue operation: "queue (queueName)" is used to….
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue

Question: 46 (Choose 1 answer)


In the sequential file we process the records one by one. After the operating system processes the
last record the ….. is detected and the loop is exited.
A. Hashed file
B. Sequential file
C. EOF
D. None of others

Question: 47
(Choose 1 answer)
In the ….. hashing method, the key is divided by the file size, and the address is the remainder plus 1.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction

Question: 48 (Choose 1 answer)


….are provided by most operating systems for organizing files. This performs the same function as a
folder in a filing cabinet.
A. Operating system
B. Files
C. Binary files
D. Directories

Question: 49
(Choose 1 answer)
In a three-level DBMS architecture, the …..level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical

Question: 50
(Choose 1 answer)
In the network database model, the entities are organized in a ….in which some entities can be
accessed through several paths
A. Graph
B. Tree
C. Array
D. Record

Question: 51
(Choose 1 answer)
Each column in a relation is called….
A. An attribute
B. A tuple
C. A union
D. An attitude

Question: 52
(Choose 1 answer)
The unary …. relation.operation always results in a relation that has exactly one more row than the
original
A. Insert
B. Delete
C. Update
D. Select

Question: 53
(Choose 1 answer)
The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database asministrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database adminitrators

Question: 54
(Choose 1 answer)
In the attacks threaten confidentiality based on…. they can obtain some other type of information by
monitoring online traffic

A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis

Question: 55
(Choose 1 answer)
Before transmission the sender transforms the plaintext into the ciphertext-this is…..
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

Question: 56
(Choose 1 answer)
….are unwanted programs that are hidden within other programs (host). When the user executes the
host program
A. DoS
B. Trojan horses
C. Worms
D. Viruses

Question: 57
(Choose 1 answer)
Sending a virus to a computer is called an…..attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

Question: 58
(Choose 1 answer)
In a…. the relationship between a character in the plaintext to a character in the ciphertext is one-to-
many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher

Question: 59
(Choose 1 answer)
….ciphers are sometimes called public-key ciphers
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Private-key

Question: 60
(Choose 1 answer)
In a computer, the…. subsystem stores data and programs
A. ALU
B. Input/output
C. Memory
D. Control unit

ĐÁP ÁN
1. B. Humanware
2. C. Computer languages
3. B. A register
4. A. Most computers typically spend 80 percent of their time accessing only 20
percent of the data
5. B. Dot pitch
6. D. All of others
7. B. Binary codes
8. D. 16
9. B. (C)16
10. A. 63
11. C. AA17
12. C. Mantissa
13. C. Encryption
14. C. B × S
15. B. Pixels
16. B. 1100 1100
17. A. LAN
18. E. Transmission medium
19. A. Transport
20. D. TCP, UDP, and SCTP
21. C. Hybrid network
22. A, B, C, D (Four answers required)
23. B. Share hardware resources with many programs simultaneously
24. A. Mono-programming
25. A. Job
26. D. Waiting state
27. B. Decision
28. C. Pseudocode
29. B. Searching
30. A. Selection
31. A. Lexical
32. A. Algorithmic language
33. D. Object-oriented paradigm
34.
35. C. Implementation phase
36. A. Analysis
37. B. Design
38. B. Interoperability
39. A. Boundary-value testing
40. D. Row-major storage
41. C. A field
42. A. The first
43. C. Inserts an item at the top
44. D. Breadth-first traversal
45. C. Create an empty queue
46. C. EOF
47. B. Division remainder
48. D. Directories
49. A. External
50. A. Graph
51. A. An attribute
52. A. Insert
53. A. End users and database administrators
54. D. Traffic analysis
55. C. Encryption
56. B. Trojan horses
57. D. Neither a nor b
58. C. Polyalphabetic cipher
59. B. Asymmetric-key
60. C. Memory

You might also like