Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

NUEVA VIZCAYA STATE UNIVERSITY


Bambang, Nueva Vizcaya

COLLEGE OF INDUSTRIAL TECHNOLOGY


MIDTERM EXAMINATION
PLATFORM TECHNOLOGIES
First Semester, School Year 2022 – 2023

Name ___________________________________________ Score ___________


Course and Year __________________________________ Date ____________

I. Multiple Choice: Choose the BEST answer for the following questions and write on the blank provided before
each number.
_____ 1. It is electronic calculating machine that accepts the (data) digitized input information process it as
per the list of internally stored instructions and produces the resulting information.
a. Computer c. Arithmometer
b. Calculator d. Satellites
_____ 2. It is the most common type of desk top computers with processing and storage units along with
various input and output devices. 
a. Super Computers c. Workstations
b. Notebook Computers d. Personal Computers
_____ 3. It is a collection of technologies that serve as the foundation for the development of other
applications, processes, or technologies.
a. Platform c. Platform Technologies
b. Technologies d. Operating System Platforms
_____ 4. It is done to differentiate between core-platform-function, and the application layer that sits on top of,
and draws upon, these underlying common services.
a. Platform c. Platform Technologies
b. Technologies d. Operating System Platforms
_____ 5. It is type of memory where large amounts of data & programs must be stored, particularly
information that is accessed infrequently.
a. Primary Memory c. Secondary Memory
b. Control Memory d. Working Memory
_____ 6. It is type of memory where exclusively associated with the processor and operates at the electronics
speed’s programs must be stored in this memory while they are being executed.
a. Primary Memory c. Secondary Memory
b. Control Memory d. Working Memory
_____ 7. Its basic function is to send the processed results to the outside world.
a. Output Unit c. Memory Unit
b. Control Unit d. Arithmetic Logic Unit
_____ 8. These are type of computers with compact and portable versions of PC. 
a. Super Computers c. Workstations
b. Notebook Computers d. Notebook Computers
_____ 9. It has high resolution input/output (I/O) graphics capability, but with same dimensions as that of
desktop computer. 
a. Super Computers c. Workstations
b. Notebook Computers d. Notebook Computers
_____ 10.It enables a single processor to control several external devices such as keyboards, displays,
magnetic and optical disks, sensors, and other mechanical controllers. 
a. Output Unit c. Memory Unit
b. Control Unit d. Arithmetic Logic Unit
_____ 11.Which of the following is NOT a function of Operating System. 
a. Ability to evolve c. Efficiency
b. Convenience d. Lack of Data Insight
_____ 12. It is a program that controls the execution of application programs and acts as an interface between
the user of a computer and the computer hardware. 
a. Application c. Operating System
b. Computer Hardware d. Computer System
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya

_____ 13.It is a program that accepts a source program in a “high-level language “and produces a
corresponding object program.
a. Compiler c. Assembler
b. Interpreter d. Loader
_____ 14.It is a program that appears to execute a source program as if it was machine language.
a. Compiler c. Assembler
b. Interpreter d. Loader
_____ 15.It is a routine that loads an object program and prepares it for execution.
a. Compiler c. Assembler
b. Interpreter d. Loader
_____ 16.It is a type of Operating System that allows many users to share the computer resources.
a. Time sharing Operating System c. Distributed Operating System
b. Network Operating System d. Real time Operating System
_____ 17.It is a type of Operating System running in different operating system can participate in common
network.
a. Time sharing Operating System c. Distributed Operating System
b. Network Operating System d. Real time Operating System
_____ 18.Which of the following is an example of Operating system.
a. Oracle c. The Router
b. GNU d. Java
_____ 19.It is a memory management technique in which process address space is broken into blocks of the
same size called pages.
a. Frames c. Paging
b. Segmentation d. Authentication
_____ 20.It refers to providing a protection system to computer system resources such as CPU, memory, disk,
software programs and most importantly data/information stored in the computer system.
a. Security c. Sequential Access
b. Bus structure d. Space Allocation
_____ 21.This access method is the most primitive one.
a. Security c. Sequential Access
b. Bus structure d. Space Allocation
_____ 22. It is a memory management technique in which each job is divided into several segments of
different sizes, one for each module that contains pieces that perform related functions.
a. Authentication c. One Time Passwords
b. Segmentation d. System Threats
_____ 23.It is a program threats that traps user login credentials and stores them to send to malicious user
who can login to computer and can access system resources.
a. Trojan horse c. Logic Bomb
b. Trap door d. Virus
_____ 24.It is a program threats that when a program misbehaves only when certain conditions met otherwise
it works as a genuine program.
a. Trojan horse c. Logic Bomb
b. Trap door d. Virus
_____ 25. It refers to misuse of system services and network connections to put user in trouble.
a. System threats c. File Type
b. Ordinary files d. Directory File
_____ 26. It is a collection of physical parts of a computer system.

a. Computer Hardware c. Input Devices


b. Keyboard d. Output Devices

_____ 27. It acts as an advanced machine where the end user communicates directly with the hardware
through a specific program or application.

a. Graphic User Interface c. Resource Manager


b. Operating System d. Shell
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya

_____ 28.It is a named collection of related information that is recorded on secondary storage such as
magnetic disks, magnetic tapes, and optical disks.
a. Middleware c. File
b. Enterprise d. Storage

_____ 29. Which of the following is an advantage of concurrency.


a. Sharing global resources c. Locking the channel
b. Running of multiple applications d. Optimal allocation resources

_____ 30. It is type of allocation, relocation-register scheme is used to protect user processes from each other,
and from changing operating-system code and data.
a. Middleware c. File
b. Enterprise d. Storage

_____ 31.It is a named collection of related information that is recorded on secondary storage such as
magnetic disks, magnetic tapes, and optical disks.
a. Single-partition allocation
b. Multiple-partition allocation 
c. Medium-partition allocation
d. Full-partition allocation
_____ 32.It is designed to work as required, have a security hole in its code and perform illegal action without
knowledge of user then it is called to have a trap door.
a. Trojan horse c. Logic Bomb
b. Trap door d. Virus
_____ 33.It is a named collection of related information that is recorded on secondary storage such as
magnetic disks, magnetic tapes, and optical disks.
a. Sequential Access c. Contiguous Allocation
b. Indexed Sequential Access d. File Access Mechanisms

_____ 34.Operating Systems generally identifies/authenticates users using following three ways, EXCEPT
a. Username / Password c. Random numbers
b. User card / key d. User attributes

_____ 35.It is the functionality of an operating system which handles or manages primary memory and moves
processes back and forth between main memory and disk during execution.
a. Memory Management c. Relative Addresses
b. Symbolic Addresses d. Physical Addresses

_____ 36.It is set of all logical addresses generated by a program.


a. Relative Address c. logical address space
b. Symbolic Addresses d. physical address space
_____ 37.It is set of all logical addresses generated by a program.
a. Relative Address c. logical address space
b. Symbolic Addresses d. physical address space
_____ 38.It is responsible for loading the process selected by Short-term scheduler on the CPU switching.
a. Middleware c. File
b. Enterprise d. Dispatcher

_____ 39. It is used to store program data which is currently being executed in the CPU.
a. Main Memory c. Cache Memory
b. Auxillary Memory d. Random Access Memory

_____ 40. It consists of input devices that are attached to the computer.
a. Input Unit c. Memory Registers
b. Central Processing Unit d. Control Unit
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya

II. True or False. Write NETWORK if the statement is correct and WEB if the statement is incorrect on the
line before each statement.
____________1. In electronic systems and computing, firmware is a tangible electronic component with
embedded software instructions, such as a BIOS.
____________2. Flashing involves the overwriting of existing firmware or data on EEPROM modules present
in
an electronic device with new data.
____________3. Firmware is the process of assigning either unique version names or unique version
numbers to unique states of computer software.
____________4. Platform middleware connects different application architectures.
____________5. Enterprise and platform connect software components or enterprise applications.
____________6. Watts (W) is also a term used to express heat output and cooling. One watt is equal to
3.412
Btu/hr.
____________7. In computing, a server is a piece of computer hardware or software (computer program) that
provides functionality for other programs or devices, called "programs".
____________8. The role of a server is to share data as well as to share resources and distribute work. A
server
computer can serve its own computer programs as well, depending on the scenario, this
could
be part of a quid pro quo transaction, or simply a technical possibility. The following table
shows
several scenarios in which a server is used.
____________9. Hardware requirement for servers vary widely, depending on the server's purpose and its
software.
____________10. Segregation is the process of bringing together various types of software sub-systems so
that
they create a unified single system.
____________11. Minicomputers that contain several processor units are called multiprocessor
system.
____________12. Medium term is responsible for selecting one process from ready state for scheduling it on
the running state.
____________13. The choice between Static or Dynamic Loading is to be made at the time of computer
program
being developed. If you must load your program statically, then at the time of compilation,
the complete programs will be compiled and linked without leaving any external program or
module dependency. The linker combines the object program with another necessary object
modules into an absolute program, which also includes logical addresses.
____________14. Swapping is a mechanism in which a process can be swapped temporarily out of main
memory (or move) to secondary storage (disk) and make that memory available to other
processes.
____________15. Paging is a memory management technique in which process address space is broken
into
blocks of the same size called pages (size is power of 2, between 512 bytes and 8192
bytes).
____________16. Segment map table is a memory management technique in which each job is divided into
several segments of different sizes, one for each module that contains pieces that perform
related functions.
____________17. Denial of service attacks normally prevent user to make legitimate use of the system.
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bambang, Nueva Vizcaya

____________18. Worm is a mechanism or means by which a hacker can detects system vulnerabilities to
make an attack on the system.
____________19 Logic Bomb refers to misuse of system services and network connections to put user in
trouble.
____________20. File type refers to the ability of the operating system to distinguish different types of file such
as text files source files and binary files etc.

III. Solving. Calculate the following binary numbers by performing calculation needed to complete task using
the mathematical fundamental operation addition. Show the ASCII Decimal Value (Checking). (5points
each)

1. 101011 6. 10000110
1111 101010

2. 10111 7. 1110101
1110 1010

3. 1000111 8. 100110
101010 1111

4. 11111 9. 10101010
1000 100

5. 11100111 10. 1000


1110001 1001

Prepared by: Reviewed by:

You might also like