source csi (2)
source csi (2)
(Choose 1 answer)
The personnel who deals with the computer & its management put together are called
A. Software
B. Humanware
C. Firmware
D. Hardware
E. None of the others
Question: 2
(Choose 1 answer)
FORTRAN and COBOL are examples of…..
A. Hardware
B. Operating systems
C. Computer languages
D. Algorithms
Question: 3
(Choose 1 answer)
……is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive
Question: 4
(Choose 1 answer)
What is the 80-20 rule in cache?
A. Most computers typically spend 80 percent of their time accessing only 20 percent of the data
B. Cache memory at any time contains a copy of a portion of main memory.
C. It can hold data 20 percent to make access faster at least 80 percent of the time.
D. The CPU need to checks the cache first.
Question: 5
(Choose 1 answer)
A monitor's….. is the distance between the holes in the mask behind the screen. This helps determine
how sharp the dots appear.
A. Refresh rate
B. Dot pitch
C. Resolution
D. Color depth
E. None of the others
Question: 6
(Choose 1 answer)
What is taxonomy of computer organization?
A. SIMD - Single Instruction-stream, Multiple Data-stream
B. MISD - Multiple Instruction-stream, Single Data-stream
C. MIMD - Multiple Instruction-stream, Multiple Data-stream
D. All of others
Question: 7
(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
Question: 8
(Choose 1 answer)
The base of the hexadecimal number system is….
A. 2
B. 8
C. 10
D. 16
Question: 10
(Choose 1 answer)
The maximum value of an octal integer with K=2 digits is Nmax =......
A. 63
B. 64
C. 65
D. 66
E. None of the others
Question: 11
(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is…..
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
Question: 12
(Choose 1 answer)
The precision of the fractional part of a number stored in a computer is defined by the…..
A. Sign
B. Exponent
C. Mantissa
D. Last digit
Question: 13
(Choose 1 answer)
Which of the following is the coding of data so that it can't be easily understood if intercepted?
A. Barcode
B. Decoder
C. Encryption
D. Mnemonics
E. None of the others
Question: 14
(Choose 1 answer)
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how
to calculate BIT RATE (R)?
A. B\times2S
B. 2B\times S
C. BxS
D. B2\times S2
Question: 15
(Choose 1 answer)
In the storing images, the samples are called (which stands for picture elements).
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others
Question: 16
(Choose 1 answer)
Use a arithmetic right shift operation on the bit pattern 1001 1000
Α. 0100 1100
Β. 1100 1100
C. 1101 1001
D. 1001 1000
Question: 17
(Choose 1 answer)
……..is usually privately owned, limited in size and connects some hosts in a single office, building, or
campus.
A. LAN
B. WAN
C. Internet
D. Network
Question: 18
(Choose 1 answer)
In physical layer, a ……can be broadly defined as anything that can carry information from a source to
a destination.
A. Digital-to-digital conversion
B. Analog-to-digital conversion
C. Digital-to-analog conversion
D. Analog-to-analog conversion
E. Transmission medium
Question: 19
(Choose 1 answer)
The……layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire
message.
A. Transport
B. Network
C. Data-link
D. Session
Question: 20
(Choose 1 answer)
……protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
Question: 22
(Choose 4 answers)
The major design goals of an operating system:
A. Efficient use of hardware and easy use of resources
B. Control subsystems and manage memory
C. Access I/O device and CPU
D. Provide UI
E. Operation on data
F. Text editor
Question: 23
(Choose 1 answer)
A multi programming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D. Use many operating systems
E. None of the others
Question: 24
(Choose 1 answer)
In….. only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging
Question: 25
(Choose 1 answer)
The…… scheduler creates a process from a job and changes a process back to a job.
A. Job
B. Process
C. Virtual
D. Queue
Question: 27
(Choose 1 answer)
The….. construct tests a condition.
A. Sequence
B. Decision
C. Repetition
D. Flow
Question: 28
(Choose 1 answer)
…..is an English-language-like representation of code.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
Question: 29
(Choose 1 answer)
…..is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
Question: 30
(Choose 1 answer)
In….. sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every
Question: 31
(Choose 1 answer)
A….. analyzer reads the source code symbol by symbol and creates a list of tokens in the source
language
A. Lexical
B. Syntax
C. Semantic
D. Code generation
Question: 32
(Choose 1 answer)
A notation used to express clearly on algorithm is known as
A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the others
Question: 33
(Choose 1 answer)
A. Procedural paradigm
In the….. we can think of a program as an active agent that manipulates passive objects.
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
Question 34:
A. Compound statement
B. Assignment statement
C. Control statement
D. None of others
Question: 35
(Choose 1 answer)
In a…. languages the project team needs to choose a language or a set of languages from among the
procedural
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
Question: 36
(Choose 1 answer)
Defining the users, requirements, and methods is part of the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing
Question: 37
(Choose 1 answer)
In the system development process, structure charts are tools used in the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing
Question: 38
(Choose 1 answer)
What is quality referring to the ability to move data and/or a system from one platform to another and
to reuse code?
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability
Question: 39
(Choose 1 answer)
What is the method in black-box testing that a subset of values in the input domain is selected for
testing?.
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
Question: 40
(Choose 1 answer)
What is more common technique of two-dimensional arrays that can be stored in memory?
A. Column-major storage
B. DMA
C. Isolated I/O
D. Row-major storage
Question: 41
(Choose 1 answer)
Each element in a record is called…..
A. A variable
B. An index
C. A field
D. A node
Question: 42
(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies…. element of the linked list.
A. The first
B. The second
C. The last
D. Any
Question: 43
(Choose 1 answer)
The push operation …. of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
Question: 45
(Choose 1 answer)
The queue operation: "queue (queueName)" is used to….
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
Question: 47
(Choose 1 answer)
In the ….. hashing method, the key is divided by the file size, and the address is the remainder plus 1.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
Question: 49
(Choose 1 answer)
In a three-level DBMS architecture, the …..level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical
Question: 50
(Choose 1 answer)
In the network database model, the entities are organized in a ….in which some entities can be
accessed through several paths
A. Graph
B. Tree
C. Array
D. Record
Question: 51
(Choose 1 answer)
Each column in a relation is called….
A. An attribute
B. A tuple
C. A union
D. An attitude
Question: 52
(Choose 1 answer)
The unary …. relation.operation always results in a relation that has exactly one more row than the
original
A. Insert
B. Delete
C. Update
D. Select
Question: 53
(Choose 1 answer)
The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database asministrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database adminitrators
Question: 54
(Choose 1 answer)
In the attacks threaten confidentiality based on…. they can obtain some other type of information by
monitoring online traffic
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis
Question: 55
(Choose 1 answer)
Before transmission the sender transforms the plaintext into the ciphertext-this is…..
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
Question: 56
(Choose 1 answer)
….are unwanted programs that are hidden within other programs (host). When the user executes the
host program
A. DoS
B. Trojan horses
C. Worms
D. Viruses
Question: 57
(Choose 1 answer)
Sending a virus to a computer is called an…..attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
Question: 58
(Choose 1 answer)
In a…. the relationship between a character in the plaintext to a character in the ciphertext is one-to-
many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
Question: 59
(Choose 1 answer)
….ciphers are sometimes called public-key ciphers
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Private-key
Question: 60
(Choose 1 answer)
In a computer, the…. subsystem stores data and programs
A. ALU
B. Input/output
C. Memory
D. Control unit
ĐÁP ÁN
1. B. Humanware
2. C. Computer languages
3. B. A register
4. A. Most computers typically spend 80 percent of their time accessing only 20
percent of the data
5. B. Dot pitch
6. D. All of others
7. B. Binary codes
8. D. 16
9. B. (C)16
10. A. 63
11. C. AA17
12. C. Mantissa
13. C. Encryption
14. C. B × S
15. B. Pixels
16. B. 1100 1100
17. A. LAN
18. E. Transmission medium
19. A. Transport
20. D. TCP, UDP, and SCTP
21. C. Hybrid network
22. A, B, C, D (Four answers required)
23. B. Share hardware resources with many programs simultaneously
24. A. Mono-programming
25. A. Job
26. D. Waiting state
27. B. Decision
28. C. Pseudocode
29. B. Searching
30. A. Selection
31. A. Lexical
32. A. Algorithmic language
33. D. Object-oriented paradigm
34.
35. C. Implementation phase
36. A. Analysis
37. B. Design
38. B. Interoperability
39. A. Boundary-value testing
40. D. Row-major storage
41. C. A field
42. A. The first
43. C. Inserts an item at the top
44. D. Breadth-first traversal
45. C. Create an empty queue
46. C. EOF
47. B. Division remainder
48. D. Directories
49. A. External
50. A. Graph
51. A. An attribute
52. A. Insert
53. A. End users and database administrators
54. D. Traffic analysis
55. C. Encryption
56. B. Trojan horses
57. D. Neither a nor b
58. C. Polyalphabetic cipher
59. B. Asymmetric-key
60. C. Memory