QA New 2
QA New 2
Final CSI
Quizzes: Chapter 01
b von Neumann c
Pascal d
Charles
Babbage
In a computer, the _______ subsystem accepts data and programs and sends processing
results to output devices.
a ALU
b input/output
c memory
d control unit
d algorithms
A 17th-century computing machine that could perform addition and subtraction was the
_______. a Pascaline b Jacquard loom c Analytical Engine d Babbage machine
10._______ is a set of instructions in a computer language that tells the computer what to
do with data. a An operating system b An algorithm
c A data processor d
A program
One of the first computers based on the von Neumann model was called _______.
a Pascal
b Pascaline
c ABC d EDVAC
The first computing machine to use the idea of storage and programming was called
_______ a
the Madeline
b EDVAC
c the Babbage machine d the Jacquard loom
Quizzes: Chapter 02
13. Convert the binary number 1001 to decimal. The answer is:
a) 7
b) 9
c) 11
d) 15
14. Convert the binary number 101010 to hexadecimal:
a) 1A
b) 1B
c) 2A
d) 2B
Quizzes: Chapter 3
2) In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.
a 4b 5c 6d 7
3) How many symbols can be represented by a bit pattern with ten bits?
a 128 b
256 c
512 d
1024
4) If the ASCII code for E is 1000101, then the ASCII code for e is _______. Answer the
question without consulting the ASCII table.
a 1000110 b
1000111 c
0000110 d
1100101
10.Assume a new Excess system uses 17 bits to represent the exponent section. What is
he bias value in this system?
a 17
b 16 c 65535 d 65536
11.Which number representation method is often used to store the exponential value of a
fractional part? a unsigned integers b two’s complement c Excess d ten’s complement
14.The precision of the fractional part of a number stored in a computer is defined by the
_______. a sign b exponent c mantissa
d last digit
15.The combination of sign and mantissa of a real number in IEEE standard floating point
format is stored as an integer in the ____________ representation. a unsigned b sign-
and-magnitude c two’s complement d one’s complement
Quizzes: Chapter 04
In two’s complement addition, if there is a final carry after the left most column
addition, _______.
a add it to the right most column b
add it to the left most column
c discard it d increase
the bit length
5. For an 8-bit allocation, the smallest decimal number that can be represented in two’s
complement form is _______.
a -8 b
-127 c
-128 d
-256
For an 8-bit allocation, the largest decimal number that can be represented in two’s
complement form is _______.
a 8
b 127 c 128 d 256
13. _______ operator (s), if the input is two 0s, the output is
0. a In only AND b In only OR c In only XOR d In AND,
OR, or XOR
To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit
pattern and the mask.
a AND
b OR c
XOR d
NOT
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then
_______ the bit pattern and the mask.
a AND
b OR c
XOR d
NOT
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______
the bit pattern and the mask.
a AND
b OR c
XOR d
NOT
Quizzes: Chapter 05
2.The _______ layer of the TCP/IP protocol suite provides services for end users. a.data-
link
b.transport
c.application
dphysical
* The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical
medium.
* physical
* data-link* network
* transport
* The _______ layer of the TCP/IP protocol suite is responsible for node-to-node
delivery of a frame between two adjacent nodes.
* transport* network
* data-link
* session
The _______ layer of the TCP/IP protocol suite is responsible for source-todestination
delivery of the entire message.
* transport* network
* data-link
* session
13. Every computer looking to access the Internet would be known as this
client
*
* desktop
* hub
* server
15. what is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or
.ca
* invalid domain
* private domain
* secure domain
* country domain
Quizzes: Chapter 06
* Partitioning
* Paging
* Demand paging * Queuing
* In _______, the program can be divided into differently sized sections. * partitioning
* paging
* demand paging
* demand segmentation
* In _______, the program can be divided into equally sized sections called pages, but
the pages need not be in memory at the same time for execution.
* partitioning
* paging
* demand paging
* demand segmentation
* A process in the _______ state can go to either the ready, terminated, or waiting states.
* hold
* virtual
* running
* hold or running
* A process in the ready state goes to the running state when _______.
* it enters memory
* it requests I/O
* it gets access to the CPU
* it finishes running
* A program becomes a _______ when it is selected by the operating system and brought to
the hold state.
* job
* process
* deadlock* partition
* The _______ scheduler creates a process from a job and changes a process back to a
job.
* job
* process
* virtual* queue
* The _______ scheduler moves a process from one process state to another.
* job
* process
* virtual* queue
* To prevent _______, an operating system can put resource restrictions on processes. *
starvation
* synchronization
* paging
* deadlock
Quizzes: Chapter 07
* The items are divided into two lists (sorted and unsorted) _____ sort.
* only in a selection
* only in a bubble
* only in an insertion
* in selection, bubble, or insertion
* In _______ sort, the item that goes into the sorted list is always the first item in the
unsorted list.
* selection
* bubble
* insertion
* every
* In _______ sort, the smallest item from the unsorted list is swapped with the item at
the beginning of the unsorted list.
* selection
* bubble
* insertion
* every
In ______ sort, the smallest item moves to the beginning of the unsorted list. There is
no one-to-one swapping.
* selection* bubble
* insertion
* every
* _______ is a basic algorithm in which we want to find the location of a target in a list
of items.
* Sorting
* Searching
* Product
* Summation
20. How many checks will a linear search take to find number 6 in the list?3, 4, 7, 6,
5, 1
* 3
* 7
* 5
* 4
Defining the users, requirements, and methods is part of the _______ phase.
a analysis b
design c
implementation d
testing
In the system development process, writing the program is part of the _______ phase.
a analysis b
design c
implementation d
testing
In the system development process, structure charts are tools used in the _______ phase.
a analysis b design c implementation d testing
_______ is a measure of how tightly two modules are bound to each other.
a Modularity
b Coupling
c Interoperability
d Cohesion
5. _______ is an ordered collection of data in which each element contains the location of
the next element.
• An array
• A record
• A linked list
• A file
8. Given a linked list called children, the pointer variable children identifies ________
element of the linked list.
• the first
• the second
• the last
• any
9. An empty linked list consists of _______.
• a node
• two nodes
• data and a link a null head pointer
Quizzes: Chapter 11
12.In postorder traversal of a binary tree, the left subtree is processed _______.
• first
• second
• last
• after the right subtree
13.In _______ traversal of a binary tree, the left subtree is processed last.
• preorder
• inorder
• postorder
• out of order
3.When a sequential file is updated, the ______ file gets the actual update.
• new master
• old master
• transaction
• error report
4.When a sequential file is updated, the ______ file contains a list of all errors occurring
during the update process.
• new master
• old master
• transaction
• error report
5.When a sequential file is updated, the ______ file contains the changes to be applied.
• new master
• old master
• transaction
• error report
6.After a sequential file is updated, the _______ file contains the most current data.
• new master
• old master
• transaction
• error report
7.If the transaction file key is 20 and the first master file key is 25, then we _______.
• add the new record to the new master file
• revise the contents of the old master file
• delete the data
• write the old master file record to the new master file
8.If the transaction file key is 20 with a delete code and the master file key is 20, then we
_______.
• add the transaction to the new master file
• revise the contents of the old master file
• delete the data
• write the old master file record to the new master file
11.In the _______ hashing method, selected digits are extracted from the key and used as
the address.
• direct
• division remainder
• modulo division
• digit extraction
12.In the _______ hashing method, the key is divided by the file size, and the address is
the remainder plus 1.
• direct
• modulo division
• division remainder
• digit extraction
13.In the _______ hashing method, there are no synonyms or collisions.
• direct
• modulo division
• division remainder
• digit extraction
14._______ are keys that hash to the same location in the data file.
• Collisions
• Buckets
• Synonyms
• Linked lists
15.When a hashing algorithm produces an address for an insertion key and that address is
already occupied, it is called a _______.
• collision
• probe
• synonym
• linked list
17.The _______ area is the file area that contains all the home addresses.
• probe
• linked
• hash
• prime
18.In the ______ collision resolution method, we try to put data that cannot be placed in
location 123 into location 124.
• open addressing
• linked list
• bucket hashing
• random hashing
19. Which one of the following explains the sequential file access method?
• random access according to the given byte number
• read bytes one at a time, in order
• read/write sequentially by record
• read/write randomly by record
20. The data structure used for file directory is called ____________
• mount table
• hash table
• file table
• process table
Quizzes: Chapter 13
1.In a three-level DBMS architecture, the layer that interacts directly with the hardware is
the _______ level.
• external
• conceptual
• internal
• physical
2.In a three-level DBMS architecture, the _______ level determines where data is
actually stored on the storage devices.
• external
• conceptual
• internal
• physical
3.The _______ level of a three-level DBMS architecture defines the logical view of the
data.
• external
• conceptual
• internal
• physical
4.The data model and the schema of a DBMS are often defined at the _______ level.
external
• conceptual
• internal
• physical
5.In a three-level DBMS architecture, the _______ level interacts directly with the users.
• external
• conceptual
• internal
• physical
6.Of the various database models, the _______ model is the most prevalent today.
• hierarchical
• network
• relational
• linked list
9.A unary operator is applied to _______ relation(s) and creates an output of ________
relation(s).
• one, one
• one, two two, one
• two, two
10.A binary operator is applied to _______ relations (s) and creates an output of
________ relation(s).
• one, one
• one, two two, one
• two, two
11.The unary _______ operation always results in a relation that has exactly one more
row than the original relation.
• insert
• delete
• update
• select
12.If you want to change the value of an attribute of a tuple, you use the _______
operation.
• project
• join
• update
• select
13.The operation that takes two relations and combines them based on common attributes
is the _________ operation.
• join
• project
• union
• intersection
14.If you need to delete an attribute in a relation, you can use the _______ operation.
• join
• project
• union
• intersection
15.You want to create a relation called New that contains tuples that belong to both
relation A and relation B. For this, you can use the _______ operation.
• select union
• project
• intersection
19. Given the basic ER and relational models, which of the following is
INCORRECT?
• Select
• Get
• Extract
• Open
Quizzes: Chapter 14
2.A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is
___.
• run-length encoding
• Morse coding
• Huffman encoding
• Lempel Ziv encoding
5.___ data compression method, the received data need not be an exact copy of the original
message.
• Only in MP3
• Only in JPEG
• Only in MPEG
• In MP3, JPEG, or MPEG
7.In ___ encoding, the more frequently occurring characters have shorter codes than the
less frequently occurring characters.
• Huffman
• run-length
• LZ
• JPEG
10.JPEG encoding involves ___, a process that reveals the redundancies in a block.
• blocking
• the discrete cosine transform
• quantization
• vectorization
11.In JPEG encoding, the ___ process breaks the original picture into smaller blocks and
assigns a value to each pixel in a block.
• blocking
• DCT
• quantization
• vectorization
13.___ is a lossy compression method for pictures and graphics, whereas ___ is a lossy
compression method for video.
• DCT, MPEG
• MPEG, JPEG
• JPEG, MPEG
• JPEG, DCT