Final Sp23 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Ôn tập CSI

1:To search for elements, we can use__ on sorted arrays that can help to decrease time code?
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
2:What is the number of bit patterns provided by a 7-bit code?
A. 256
B. 128
C. 64
D. 512
E. None of the others
3: How many connections (in the data bus) do we need to transfer 4 bytes of a word at the same
A. 4
B. 8
C. 16

D. 32 (Number of bits = Number of bytes * 8)

4: The___ is a pointer that identifies the next element in the linked list.

A. Link

B. Node

C. Array

D. Data

5: ____were designed in the 1950s to control mainframe computers.

A. Time-sharing systems

B. Batch operating system

C. Personal systems

D. Parallel systems
6: In the__ a program is considered a mathematical function. In this context a function is a
maps a list of inputs to a list of outputs

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

7: The____ manager is responsible for archiving and backup.

A. Memory

B. Process

C. Device

D. File

8: Instructions and memory addresses are represented by

A. Character codes

B. Binary codes

C. Binary word

D. Parity bit

E. None of the others

9: Most important advantage of an IC is its

A. Easy replacement in case of circuit failure

B. Extremely high reliability

C. Reduced cost

D. Low power consumption

E. None of the others

10: The__ deals with active objects instead of passive objects

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm
D. Object-oriented paradigm

11: In the storing audio, if the signal is changing rapidly, we need more samples. It has been shc

40000 samples per second is good enough to reproduce an audio signal.

A. Quantization

B. Sampling rate

C. Encoding

D. Bit depth

12: We can convert a number in any system to decimal. We multiply each digit with its___ in
and add the result to get the number in the decimal system.
A. Numbers
B. Values
C. Place value
D. None of others

13: _______cryptography is often used for short messages.

A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Open-key
14: A process in the______ state can go to either the ready, terminated, or waiting states
A. Hold
B. Virtual
C. Running
D. Hold or running
15: The basic unit within a computer store capable of holding a single unit of data is
A. Register
B. ALUC.
Control unit
D. Store location
E. None of the others
16: Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding

17: _____is an English-language-like representation of an algorithm. There is no standard for it -:

a lot of detail
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram
18: In a ____ the project team needs to choose a language or a set of languages from among th
languages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
19: The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others

20: The pop operation _____of the stack

A. Deletes an item from the top


B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
21: What is a program of UNIX that accepts requests from users (processes) and interprets ther
the operating system?
A. Software
B. Functio
C. SHELL
D. Feature
22: The____ layer of the TCP/IP protocol suite provides services for end users.
A. Data-link
B. Transport
C. Application
D. Physical
23: In the asymmetric-key method used for confidentiality, which key(s) is (are) publicly known?
A. Encryption key only
B. Decryption key only
C. Both encryption and decryption keys
D. Neither encryption key nor decryption key
24: The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database asministrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database adminitrators
25: The queue operation: "queue (queueName)" is used to___
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
26: One phase in system development is___
A. Analysis
B. Application
C.Designing
D. Collecting
27: Each element in a record is called
A. A variable
B. An index
C. A field
D. A node
28:______ file can be accessed sequentially.
A. A sequential
B. An indexed
C. A hashed
D. No
29: The unary___operation always results in a relation that has exactly one more row thar
relation.
A. Insert
B. Delete
C. Update
D. Select

You might also like