You are on page 1of 114

Chapter 1

Type 1

1. Name two needs of society that led to the development of more complex
mathematics.
F. The evolution of the human race [i.e.] Advancing from tents to buildings and
building structures of epic proportions and scale (i.e.) Pyramids and Greek
Parthenon’s. Navigation across both land and water also demanded the need for
more complex math.
2. What was the first mechanical device used for calculation?
F. The Slide ruler was the first mechanical device used for calculation.
3. How would you compare the early electronic computer to the player piano?
F. Both devices had a stored program and could be programmed by using the
interface.
4. What technology did Herman Hollerith borrow from the Jacquard loom?
F. The concept of PUNCH CARDS (i.e.) A set of re-usable cards. Similar to that of
the PLAYER PIANO [used at that time period.] Where a series of holes in a paper
drum had air blowing through them, determining which notes to play.
5. Who has been called the first programmer?
F. Ada Lovelace Byron
6. Name an important concept attributed to the person named Ada Lovelace Byron.
F. The "program loop."
7. What innovation does the ENIAC appear to borrow from the Atanasoff-Berry
Computer?
F. Vacuum tubes and Boolean logic were the innovations the ENIAC borrowed from
the Atanasoff-Berry Computer.
8. Name at least one computer other than ENIAC that was developed independently
and simultaneously during World War II.
F. Mark I
9. What reason is given for the invention of assembly language?
F. Writing programs in binary is long, tedious and an error-prone process. Assembly
language is easier to manage than straight binary.
10. What color can you attribute to IBM of the 1950s, and what significance did it
have for IBM's eventual dominance of the marketplace?
F. Blue was the color that could be attributed to IBM in the 1950’s. The significance it
had to IBM’s eventual dominance in the market place was the appeal it had to the
general public. Showing men in blue business suits, as well as their slogan: “You
can’t go wrong buying IBM.”

11. Name two important developments of the second generation of hardware.


F. The transistor replaced the vacuum tubes. It was far smaller and cooler. A form of
RAM was also developed.
12. What long-term memory storage device that computers have today did second-
generation computers often lack?
F. Hard Drives.
13. In what language was the first UNIX operating system written? What did
Thompson and Ritchie have to create for the second version of UNIX?
F. The first UNIX operating system was written in the B language later C (computer
languages also invented by Thompson and Ritchie).
14. On what kind of computer was the first UNIX operating system written?
F. The DEC PDP - 7
15. Before the Altair, Ed Roberts created what?
F. Calculators.
16. What software did the Altair microcomputer get that later helped make Bill Gates
rich?
F. BASIC.
17. Name the two people responsible for the first Apple computer. Name the "killer
app" responsible for the Apple II's success.
F. Steve Jobs and Steve Wozniak were responsible for the first Apple Computer.
The killer app that was responsible for the Apple II’s success was: visicalc
18. What challenge to the IBM PC did Apple launch in 1984? What response did
Microsoft launch against Apple a few years later?
F. Macintosh. The concept of open architecture and for it to sell its OS to Hardware
vendors.
Also MS worked to release an OS that would mimic the Mac's GUI. As such released
a version of Windows 3.x in 1988.
19. One of the ideas used in the development of ARPANET-splitting information into
blocks and reassembling them at their destination came from the Rand Corporation.
The initial concept began in relation to what system?
F. The U.S. telephone system.
20. To whom, writing in the 1940s, have the origins of hypertext been attributed?
F. Hypertext had its origins in a 1945 proposal by U.S. President Roosevelt's
scientific advisor Vannevar Bush. Bush imagined a machine that could store
information and allow users to link text and illustrations, thus creating "information
trails."

Type 2
1. In 1642 Pascal created a mechanical device with gears and levers. This device
was capable of what kind of calculation?
A. Addition
B. Addition and subtraction
C. Addition, subtraction, and multiplication
D. Addition, subtraction, multiplication, and division

2. Leibniz built on Pascal's work by creating the Leibniz Wheel. This device was
capable of what kind of calculations in addition to the ones Pascal's could do?
A. Subtraction
B. Addition and multiplication
C. Subtraction and multiplication
D. Multiplication and division

3. The Jacquard loom is important in the history of computing for what innovation?
A. It worked like a player piano.
B. Reusable cards with holes held information.
C. It used gears and wheels for calculation.
D. Paper rolls with holes held information.

4. IBM has some of its origins in what 1890 event?


A. The U.S. census
B. The first Jacquard loom in the United States
C. Ada Lovelace's first program loop
D. The introduction of electricity to the United States

5. Name the four important elements of Babbage's Engine that are components of
today's computer.
A. The stored program technique, an input device, an output device, and memory
B. Mechanical calculation equipment, human-powered mechanisms, punched cards,
and an output device
C. An input device, memory, a central processing unit, an output device
D. An input device, the stored program technique, a central processing unit, and an
output device

6. What logical elements did Charles Sanders Peirce realize electrical switches could
emulate in 1880?
A. Epistemological calculus
B. Ontological algebra
C. Boolean algebra
D. Metaphysical algebra

7. The U.S. military used the ENIAC computer for its intended purpose during World
War II.
A. True
B. False

8. What important concept is attributed to John Von Neumann?


A. The large memory concept
B. The stored program concept
C. The discrete variable automation concept
D. The virtual memory concept

9. What company controlled 70% or more of the computer marketplace in the '60s
and '70s?
A. Sperry-Univac
B. International Business Machines
C. Hollerith Machines
D. Microsoft

10. What features of transistors made them superior for computers, compared with
vacuum tubes?
A. They were more expensive than tubes but lasted longer and were cooler in
temperature.
B. They didn't last as long as tubes but were less expensive.
C. They were cheaper and smaller than tubes.
D. They were cheaper, smaller, and cooler than tubes and lasted longer.

11. What important pastry helped move your job up in the queue in second
generation software, and what third-generation software development made that
pastry unnecessary?
A. Donuts and integrated circuits
B. Bear claws and multitasking
C. Donuts and time-sharing
D. Donuts and virtual memory

12. In hardware, the next step up from the transistor was the transmitter.
A. True
B. False
13. What magazines can you thank for the first microcomputer?
A. Science and Wall Street Journal
B. Popular Electronics and Radio Electronics
C. Popular Electronics and Star Trek Monthly
D. New Mexico Entrepreneur and Radio Electronics

14. What important concept did the Altair use, which was borrowed by its
competition, including the IBM personal computer?
A. The computer came in kit form.
B. The computer's price was $666.
C. The machine had an open architecture.
D. The machine could be used without plugging it into a wall outlet.

15. The Apple computer became very popular. What was its largest market, and
what software made it interesting to that market?
A. The education market and the educational game Shape Up
B. The games market and the game The Big Race
C. The business market and the program Lotus 1-2-3
D. The business market and the program visicalc

16. In 1990, what software company dominated the software market, and what major
product did it sell?
A. Lotus and Lotus 1-2-3
B. Bricklin and visicalc
C. Apple and the Apple Operating System
D. Microsoft and Word

17. Today, Microsoft considers its major competition in operating systems to be what
system?
A. Control Data Corporation OS
B. Sega Games operating system
C. Linux operating system
D. Mac OS X

18. ARPA was created in response to what major event in world history?
A. World War II
B. The mccarthy hearings of the 1950s
C. The launch of Sputnik
D. The inability of computers to communicate with one another

19. Name the three most likely critical large-scale developments of the fifth
generation of software development from this list of options:
A. Parallel computing, networking, and the multiple-data-stream approach
B. The graphical user interface, networking, and computer-aided software
engineering (CASE) tools
C. Networking, the graphical user interface, and packet switching
D. ARPANET, the Internet, and CASE tools
20. Marc Andreessen released what application that made browsers widespread?
A. Netscape
B. Mosaic
C. Explorer
D. Hypertext

1. What is the purpose of a main board?


F. The purpose of the main board is to house the CPU [actual computer] as well as
the various slot that allows memory and cards that allow peripheral devices to be
connected to the motherboard. Allowing the computer to have added functionality.
2. What does CPU stand for?
F. Central Processing Unit.
3. What are the four basic functions implemented in the CPU?
F. The 4 basic functions implemented in the CPU are: Adding, Decoding, Storing,
Shifting
4. What is the purpose of a decoder circuit?
F. The purpose of the decoding circuit is to react to specific bit patterns by setting an
output of 1 when the pattern is recognized. Decoders are often used to select a
memory location based on a binary address.
5. What are the three parts of a transistor?
F. The 3 parts of a transistor are:Emitter, Collector, Base
6. What are the main Boolean operators?
F. The 3 Boolean operators are: AND, OR, NOT
7. What type of table is used to represent the inputs and outputs of a logic circuit?
F. Truth table.
8. Which complex circuit is used to address memory?
F. Decoder
9. What is the output of an XOR gate if both inputs are 0?
F. The output would be ‘0.’
10. Which gate is combined with an AND to form the NAND gate?
F. NOT.
11. What symbol is used for the OR Boolean operator in a Boolean expression?
F. A parallel curved line to the left
12. Which of the complex digital circuits is used to construct SRAM?
F. SRAM is constructed from flip-flop circuits.
13. Which memory type is faster: SRAM or DRAM?
F. SRAM is faster than DRAM.
14. What are the characteristics of Von Neumann architecture?
F. The characteristics of Von Neumann architecture are:
F. - Binary instructions are processed sequentially by fetching an instruction from
memory and then executing this instruction.
F. - Both instruction and data are stored in the main memory system.
F. - Instruction execution is carried out by a CPU that contains a CU, an ALU and
registers.
F. - The CPU has the capability to accept input from and provide output to external
devices.
15. In computer terminology, what is a bus?
F. A bus is: A collection of conductors, connectors and protocols that facilitates
communication between the CPU, memory and I/O devices.
16. What are the three signal groups of a bus?
F. Control
F. Access
F. Data
17. What is the purpose of cache memory?
F. The purpose of cache memory is to hold frequently accessed instructions and
data in a computer to avoid having to retrieve them from slower system DRAM.
18. What is polling?
F. A technique in which the CPU periodically interrogates I / O devices to see
whether they require Attention
19. Which is more efficient: polling or interrupt handling?
F. Interrupt handling.
20. How is resolution measured?
F. Resolution is measured in: Frames-per-second.

1. Which of the following circuit types is used to create SRAM?


A. Decoder
B. Flip-flop
C. LCD
D. ROM

2. Which of the following is not one of the basic Boolean operators?


A. AND
B. OR
C. NOT
D. XOR

3. Transistors are made of ________________ material.


A. Semiconductor
B. Boolean
C. VLSI
D. Gate

4. Which of the following is not one of the bus signal groups?


A. Control
B. Address
C. Data
D. Fetch

5. Which type of memory can't be written to easily?


A. RAM
B. SRAM
C. ROM
D. Flip-flop

6. Which of the following memory types is the fastest?


A. DRAM
B. ROM
C. XOR
D. SRAM

7. In a truth table, inputs are represented on which side?


A. Top
B. Bottom
C. Left
D. Right
8. Any Boolean expression can represented by a truth table.
A. True
B. False

9. Inputs of 1 and 0 to an XOR gate produce what output?


A. 0
B. 1

10. In a computer, what function does a decoder usually perform?


A. Adding
B. Shifting
C. Addressing memory
D. Multiplying

11. Boolean expressions are simplified through the use of:


A. Basic identities
B. Gate logic
C. Algebraic expressions
D. Specialized circuits

12. Which type of I/O processing is most efficient?


A. Boolean
B. Polling
C. Logic
D. Interrupt

13. Which of the following defines the display quality of a monitor?


A. Resolution
B. Flip rate
C. Beam strength
D. Inversion

14. Most computers today are based on:


A. Von Neumann architecture
B. Upscale integration
C. Tabulation basics
D. Small-Scale Integration

15. Which part of the CPU is responsible for mathematical operations?


A. CU
B. ALU
C. RLU
D. VLSI

16. A _______________ in computer terminology is a set of wires and protocols


designed to facilitate data transfer.
A. Gate
B. Bus
C. Boolean circuit
D. CPU

17. Most computers these days use the ________________ bus.


A. VLSI
B. ACM
C. ASI
D. PCI

18. The _______________ contains instructions and data that provide the startup
program for a computer.
A. RAM
B. DRAM
C. BIOS
D. CPU

19. High-speed __________________ is used to speed processing in a computer


system.
A. Mass storage
B. Cache memory
C. ROM
D. CD-ROM

20. The quality of printer output is measured in _______________________.


A. Ppm
B. Cu
C. Dpi
D. Rom

1. What does the subscript 10 indicate in the number 3456 10?


F. BASE 10 numbering system
2. What does the superscript 10 indicate in the number 2^10?
F. The BASE has an exponential value of 10
3. What is the value of 2^8?
F. 256
4. What is the positional value of the first digit on the left of the binary number
10110?
F. 16
5. What is the largest number of items that can be represented with 4 binary bits?
F. 16
6. What is the positional value of the A in the hexadecimal number CAFE?
F. 256

7. What numeric value in base 10 does the binary number 10101010 represent?
F. 170
8. What is the binary equivalent of the decimal number 345?
F. 101011001
9. What base 10 value is equivalent to 1C4B?
F. 7243
10. What base 16 value is equivalent to 2576?
F. A10
11. What numeric value in hexadecimal is equivalent to the binary number
1011111010101101?
F. BEAD
12. What binary value is equivalent to the hexadecimal number C43A?
F. 1100 0100 0011 1010
13. What is the binary result of adding the binary numbers 1001 + 1111?
F. 11000
14. What is the twos complement value of the binary number 01110110?
F. 10001010
15. How many unique characters does Extended ASCII allow?
F. 256
16. How many pixels is a computer monitor with a resolution of 1024 x 768 capable
of displaying?
F. 786432 Pixels
17. What is the ASCII code (in hex) for the uppercase letter A?
F. 41
18. How many different colors can be represented with a 24-bit pixel?
F. More than 16 million different colors
19. Which of these image formats BMP, JPG, GIF is not compressed?
F. BMP
20. Any number raised to the 0 power returns a value of what?
F. 1

Type 2
1. What is the positional value of the A in the hexadecimal nummber C4A6?
A. 1
B. 16
C. 160
D. 256

2. What is the positional value of the 7 in the base 8 number 2715?


A. 1
B. 8
C. 64
D. 512

3. What is the value of raising 16 to 3?


A. 163
B. 48
C. 4096
D. 256

4. What is the positional value of the 1 in the binary number 100000?


A. 64
B. 32
C. 16
D. 8

5. What is the largest number of items that can be represented with four
hexadecimal digits?
A. 4096
B. 40,960
C. 65,536
D. None of the above

6. What is the positional value of the A in the hexadecimal number BEAD?


A. 2
B. 10
C. 16
D. 32

7. What numeric value in base 10 does the binary number 10000001 represent?
A. 129
B. 10,000,001
C. 65
D. None of the above

8. What is the binary equivalent of the decimal number 543?


A. 11111011110111
B. 101100111
C. 1011010011
D. 1000011111

9. What base 10 value is equivalent to 3C0D of base 16?


A. 15,373
B. 32,767
C. 68,536
D. 10,125
10. What base 16 value is equivalent to 1234 of base 10?
A. ABC
B. 4D2
C. C34
D. A65

11. What numeric value in hexadecimal is equivalent to the binary number


1101111010101101?
A. BCAF
B. BE6C
C. 6FAD
D. DEAD

12. What binary value is equivalent to the hex number C43A?


A. 1100100100010110
B. 1100110101111010
C. 1100010000111010
D. 1100001101011101

13. What is the binary result of adding the binary numbers 0110 + 1101?
A. 10011
B. 1111
C. 01101101
D. 101001

14. What is the two's complement value of the binary number 010100110?
A. 101011001
B. 101011010
C. 010100111
D. None of the above

15. How many unique characters does ASCII allow?


A. 16
B. 32
C. 128
D. 255

16. How many total bits are required to store 24-bit color information for a 1024 x
768 display?
A. 18,874,368
B. 786,432
C. 1024
D. 24

17. What is the ASCII code (in hex) for the lowercase letter z?
A. 7A
B. 80
C. 32
D. AB

18. What is the minimum number of bits required to represent 256 colors?
A. 4
B. 8
C. 16
D. 32

19. What color is represented if all the pixel bits are 1s?
A. Red
B. Black
C. Cyan
D. White

20. Any number except 0 raised to the power of 1 is what?


A. 1
B. The positional value times the digit
C. The number itself
D. None of the above

Chapter 5 Type 1
1. What is the first program loaded into memory when a computer is started?
F. The operating system is the first program loaded into memory when a computer is
started.
2. Special programs designed to allow the computer to communicate with peripheral
devices are called what?
F. Drivers are special programs designed to allow the computer to communicate with
peripheral devices.
3. What is the core program of an OS called?
F. The CORE program of an OS called the Kernel.
4. What is multitasking?
F. Is an operating system‘s capability to effectively support more than one process
running at a time.
5. What is multiprocessing?
F. Is the coordinated execution of a process, using two or more cpus at the same
time.
6. What are the four main categories of OS functions?
F. The four main categories of operating system functions are:
F. - Providing a user interface
F. - Managing processes
F. - Managing resources (inc memory)
F. - Providing security
7. What are the two basic types of user interfaces in an OS?
F. The two basic types of user interfaces in an operating system are:
F. - Command-Line Interface
F. - Graphical User Interface [GUI]
8. What is a process in an OS?
F. A process in an Operating System is each program you run. Processes might then
start other processes to support them.
9. What method allows multiple processes to share the CPU?
F. The method allows multiple processes to share the CPU is called Time Slicing.
10. What is the purpose of an interrupt handler?
F. The purpose of an interrupt handler is to allow processes and hardware I/O
devices to interrupt the Processors' normal executing so that it can handle specific
tasks.
11. Folders and files in an OS are organized into what type of structure?
F. Folders and files in an operating system are organized into treelike structure.
12. In Linux, how do you access information on OS commands?
F. In Linux, you access information on operating system commands by using the ls
command.
13. What is the purpose of formatting a disk?
F. The purpose of formatting a disk is to arrange the disk surface into addressable
areas and to set up the basic directory tree structure on the disk.
14. Give an example of a case-sensitive OS.
F. Linux is a case-sensitive operating system.
15. What command is used in Linux to create a folder?
F. The command that is used in Linux to create a folder is: mkdir directory name
16. What command is used in Linux to list folders and files on a drive?
F. The command is used in Linux to list folders and files on a drive is: ls
17. In an operating system, what's a wildcard?
F. A wild card is a symbol that stands for one or more characters, used in selecting
files or directories.
18. In Windows, what key is used to rename a file?
F. In Windows, the key used to rename a file is F2
19. For what task is Plug and Play used in an OS?
F. Pnp is a technology that allows the OS and hardware to work together to detect
and configure I/O devices automatically.
20. Do PDA devices require an OS?
F. PDA devices DO require an operating system.

Type 2

1. DOS stands for:


A. Demand Open Sources
B. Disk Operating System
C. Device Outer Shell
D. Direct Operating System

2. Multitasking operating systems can service many different at once.


A. Users
B. Program tasks
C. User interfaces
D. Operating systems

3. The portion of an OS remains in memory the entire time the computer is on.
A. CPU
B. Overlay
C. Interrupt
D. Kernel

4. Which of the following is not a multitasking OS?


A. Linux
B. UNIX
C. Windows
D. DOS

5. An OS method of allowing multiple processes to share the CPU is:


A. Time slicing
B. Multiuser
C. I/O
D. Command line

6. Deadlocks are resolved by:


A. Interrupts
B. Time slicing
C. Memory segments
D. The OS

7. Graphical interfaces can be added to the Linux OS.


A. True
B. False

8. Command-line switches are used to:


A. Modify the command's operation
B. Disable the OS
C. Enable the graphical interface
D. Remove folders

9. Before a disk can be used, it must be:


A. Erased and locked
B. Partitioned and formatted
C. Filled with folders and files
D. Time sliced

10. The process of arranges the disk's surface into addressable areas and sets up
the disk's basic directory tree structure.
A. Partitioning
B. Time slicing
C. Booting
D. Formatting

11. The main level of a disk is called the:


A. Root
B. Platform
C. Head
D. Subdirectory

12. Windows is case sensitive.


A. True
B. False

13. In Windows, the md command must be used to create a folder.


A. True
B. False

14. What is the Linux command to list files and folders on a disk?
A. Ls
B. Lsdir
C. Chdir
D. List
15. Which of the following is the Linux command to rename files?
A. Rename
B. F11
C. Mv
D. Ls

16. The Linux command for deleting a folder is:


A. Del
B. Rd
C. Rmdir
D. Rm

17. In Windows Explorer, you can select multiple folders and files by using the left
mouse button combined with which of the following?
A. Right mouse button
B. Shift key
C. Alt key
D. Spacebar

18. The Linux wildcard _______________ can be used to match multiple characters.
A. ? (question mark)
B. - (hyphen)
C. / (forward slash)
D. * (asterisk)

19. The Linux command to delete a file is:


A. Del
B. Delfile
C. Rm
D. Filedel

20. Windows Explorer can be used to drag and drop both files and folders.
A. True
B. False

Chapter 6
Type 1
1. What are the two general types of transmission media?
F. Guided and Un-guided media.
2. What are the four ways to rate transmission media?
F. The 4 ways to rate transmission media are:
F. - Band Width.
F. - Signal-to-noise ratio.
F. - Bit error rate.
F. - Attenuation.
3. What are the two basic copper wire formats?
F. The 2 basic copper wire formats are:
F. - Twisted pair.
F. - Coaxial.

4. What is the maximum frequency of Cat 5 cable?


F. The maximum frequency of Cat 5 cable is: 100mhz.
5. What are examples of networking protocols?
F. Examples of networking protocols are:
F. - HTTP protocol.
F. - FTP protocol.
6. How many layers are in the OSI model?
F. There 7 layers in the OSI model.
7. What is a WAN?
F. WAN stands for Wide Area network. It allows for computers to connect
internationally.
8. What are the three LAN topologies?
F. Three LAN topologies are:
F. - Bus.
F. - Ring.
F. - Star.
9. Which of the three LAN topologies has emerged as the most popular?
F. With the advent of the internet; The Star topology has increased in popularity.
10. What is a NIC?
F. A circuit board that connects a network medium to the system bus. And converts a
computers’binary information into a format suitable for the transmission medium;
each NIC has a unique 48-bit address.
11. Which network device can interpret and translate different network protocols?
F. Routers.
12. What is the difference between a hub and a switch?
F. The difference between a switch and a hub is:
F. - Switch: Not all the inputs and outputs are connected. Instead, the switch
examines the input’s packet header and switches a point-to-point connection to the
output addressed by the packet.
F. - Hub: All the inputs and outputs are connected.
13. Which network device is designed to prevent damage to an inside network from
an outside source?
F. Firewall.

14. What frequency range are voice-grade telephone lines designed to carry?
F. The frequency range voice-grade telephone lines carry are designed to carry are:
300 to 3300Hz.
15. What is the speed range of DSL?
F. The speed range for DSL is: 256 Kbps to 1.5Mbps.
16. What is bandwidth?
F. A measurement of how much information can be carried in a given time period
over a wired or wireless communication medium usually measured in bps.
17. How does a WLAN differ from a LAN?
F. WLAN differs from LAN in that WLAN is a wireless topology that spans continents
as opposed to being confined to one building, structure or area.
18. What is the difference between AM and FM?
F. The difference between AM and FM are as follows:
F. - AM: (Amplitude Modulation) A technique of placing data on an alternating carrier
wave by varying the signal’s amplitude; this technique is often in modems.
F. - FM: (Frequency Modulation) A technique of placing data on an alternating carrier
wave by varying the signal’s frequency; this techniques is often used in modems.
19. How many standard voice lines are equivalent to a T1 line?
F. There are: 28 standard voice lines on a T1 line.
20. Which type of multiplexing combines signals on a circuit by dividing available
transmission bandwidth into narrower bands?
F. FDM: (Frequency Division Multiplexing) combines signals on a circuit by dividing
available transmission bandwidth into narrow bands.

Type 2
1. Which is a better signal-to-noise ratio?
A. High
B. Low
C. Guided
D. Unguided
2. Fiber-optic cable is made of:
A. Glass
B. Nylon
C. Braided copper
D. Copper
3. Which is a faster networking cable?
A. 10baset
B. 100baset

4. Which of the following standards is used in wireless networking?


A. Cat 5
B. ISO OSI
C. 802.11
D. TCP

5. Which of the following is not one of the OSI model layers?


A. Physical
B. Wireless
C. Transport
D. Application

6. Which of the OSI layers is responsible for guaranteed delivery of data?


A. Transport
B. Network
C. Data Link
D. Presentation

7. Which of the OSI layers is involved with a network's electrical specifications?


A. Physical
B. Network
C. Session
D. Transport
8. Which of the following is a LAN topology?
A. Cat 5
B. Coaxial
C. Star
D. Repeater
9. A hub has a single input and a single output.
A. True
B. False

10. Which of the following is OSI layer of repeater?


A. Data Link
B. Network
C. Physical
D. Transport

11. DSL speeds range from:


A. 256 Kbps to 1.5 Mbps
B. 256 Mbps to 15 Mbps
C. 56 Kbps to 256 Kbps
D. 100 Kbps to 156 Kbps

12. Standard voice-grade lines are designed to carry frequencies in the range of:
A. 1.5 mhz to 15 mhz
B. 500 mhz to 1 mhz
C. 56 khz to 100 khz
D. 300 Hz to 3300 Hz

13. Modems convert binary digits into sounds by modulating tones.


A. True
B. False
F. A
14. Which of the following is not a network device?
A. Router
B. Gateway
C. Ramp
D. Hub

15. Which of the following is used to connect a computer to a network?


A. Gateway
B. NIC
C. Ramp
D. Router

16. What factor reduces the strength of an electrical signal as it travels along a
transmission medium?
A. Bandwidth
B. Signal-to-noise ratio
C. Bit error rate
D. Attenuation

17. Which of the following is the most commonly used twisted pair cable category?
A. Cat 1
B. Cat 5
C. 10Base2
D. 10Base5

18. Which type of guided medium is the least susceptible to attenuation and
inductance?
A. Coaxial cable
B. Twisted pair cable
C. Fiber-optic cable
D. They are all the same
19. Which topology has become more popular with the advent of the Internet and
home networking?
A. Token ring
B. Star
C. Bus
D. Loop

20. DSL is a combination of what two types of multiplexing?


A. FDM and TDM
B. FDM and FM
C. AM and TDM
D. AM and FM

Chapter 7
Type 1

1. The Internet is a collection of ____________ and _______________.


F. Lans and wans
2. What does the acronym ISP stand for?
F. Internet Service Provider
3. What is an NBP?
F. National Backbone Provider
4. What is the protocol SMTP used for?
F. Simple Mail Transfer Protocol
5. Which Internet protocol is responsible for reliable delivery of data from one
computer to another?
F. TCP
6. Which Internet protocol manages sequencing data packets?
F. IP
7. Which Internet protocol maintains port information?
F. TCP/IP
8. What is the size, in bits, of an ipv4 address?
F. 32 bits
9. Which ipv4 class allows the greatest number of hosts?
F. Class A
10. What is the IP address 255.255.255.255 reserved for?
F. Broadcast
11. What is the regional agency that assigns IP addresses for the United States and
its territories?
F. ARIN
12. What is the function of DHCP in networking?
F. Assign IP address
13. What is a router?
F. A router is a device or software in a computer that determines the next network
point to which a packet should be forwarded.
14. What prevents TCP/IP packets from bouncing from router to router forever?
F. Time live
15. What is the purpose of FTP?
F. File transfer protocol
16. Which network device is used to resolve domain names into IP addresses?
F. DNS
17. What is the Windows command-line utility to check your computer's network
configuration?
F. IPCONFIG
18. What is the language of the World Wide Web?
F. HTML
19. What programs are used to "crawl" the Web?
F. Google, Yahoo

Type 2
1. The Internet is owned by:
A. ARIN
B. The FCC
C. The United Nations
D. None of the above

2. Internet providers maintain a switching center called a:


A. Point of presence
B. Backbone
C. Router
D. None of the above

3. The purpose of HTTP is to:


A. Format Web pages
B. Transfer Web pages
C. Route addresses
D. None of the above

4. Which of the following is not an Internet-related protocol?


A. HTTP
B. HTML
C. TCP
D. FTP

5. How many possible ports are allowed in TCP?


A. 8
B. 16
C. 65,536
D. 16,137,285
6. Which portion of the TCP/IP protocol suite provides error detection and
correction?
A. TCP
B. IP
C. Both
D. Neither

7. How many different hosts can be granted a Class A IP address allocation?


A. 16,137,285
B. 65,536
C. 16,382
D. 126

8. Which Internet protocol is used to assign IP addresses dynamically?


A. TCP
B. DHCP
C. HTTP
D. DNS

9. Routers are critical to the operation of the Internet.


A. True
B. False

10. Which Internet component is responsible for decrementing the TTL field?
A. Router
B. Switch
C. DNS
D. Packet
11. Which of the following is an example of a high-level protocol?
A. TCP
B. IP
C. DHCP
D. SMTP

12. Which of the following protocols makes the Web possible?


A. FTP
B. Telnet
C. HTTP
D. None of the above

13. Which of the following is an example of a URL?


A. Www.cengage.com
B. 192.168.0.22
C. 1110111010111010110101
D. HTTP

14. How many DNS servers does the Internet have?


A. 1
B. 2
C. Thousands
D. Millions

15. What is the standard port number for HTTP?


A. 1
B. 21
C. 50
D. 80

16. How many IP addresses are presented to the Internet when NAT is used?
A. 1
B. 21
C. Thousands
D. Unlimited

17. Which of the following is an example of an HTML tag?


A. <HTTP>
B. <HTML>.
C. <TCP>
D. <DHCP>

18. Which HTML tag is used to provide links to other pages?


A. <HTTP>
B. <LINK>
C. <A>
D. <P>

19. XML is just another name for HTML.


A. True
B. False

20. Bots are used by ______________ to crawl the World Wide Web.
A. Routers
B. Search engines
C. XML
D. TCP/IP

Chapter 8
Type 1

1. What is a database? Give an example of a database in current use that affects


you.
F. Data that has been logically related and organized into a file or set of files to allow
access and use, e,g. SQL Server
2. The table is listed in what order (primary key) (use the table in figure Database-1)?
F. Ascending order
3. Write a SQL SELECT statement to list the table's contents in order of wins (use
the table in figure Database-1).
F. SELECT * FROM result ORDER BY wins
4. Write a SQL SELECT statement to list the table's contents in order of wins and
team (use the table in figure Database-1).
F. SELECT * FROM result ORDER BY wins, team
5. Write a SQL INSERT INTO statement to add the team Bears. The Bears have 3
wins and 9 losses (use the table in figure Database-1).
F. INSERT INTO result(team, wins, losses) VALUES ('Bears', 3, 9)
6. Write a SQL INSERT INTO statement to add the team Lions. The Lions have 9
wins and 3 losses (use the table in figure Database-1).
F. INSERT INTO result(team, wins, losses) VALUES ('Lions', 9, 3)
7. Write a SQL SELECT statement to list all the table's contents (use the table in
figure Database-1).
F. SELECT * FROM result;
8. What is normalization, and what problems does it solve?
F. A database design process that structures tables to eliminate duplication and
inconsistencies in the data structure
9. Explain the first three normalization forms.
F. 1ST NF: eliminating repeating fields or groups of fields from the table and
confirming that every column has only 1 value by creating a new record in the table
F. 2ND NF: first normal form has already been applied to the table, and every
column that is not part of the primary key is fully dependant on the primary key.
F. 3RD NF: eliminates columns that are not dependent on only the primary key
10. List and explain the six steps for designing a database.
F. Step 1: Investigate and define.
F. Step 2: Make a master column list.
F. Step 3: Create the tables.
F. Step 4: Work on relationships.
F. Step 5: Analyze the design.
F. Step 6: Re-Evaluate
11. Write a SQL SELECT statement to list all teams with wins greater than 5 (use the
table in figure Database-1).
F. SELECT * FROM result WHERE wins > 5.
12. Write a SQL SELECT statement to list all teams with losses less than 5 (use the
table in figure Database-1).
F. SELECT * FROM result WHERE losses < 5.
13. Write a SQL SELECT statement to list a team with maximum wins (use the table
in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY wins DESC.
14. Wriew a SQL SELECT statement to list a team with minimum losses (use the
table in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY losses.

15. Wriew a SQL SELECT statement to list a team with minimum wins (use the table
in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY wins.
16. Wriew a SQL SELECT statement to list a team with maximum losses (use the
table in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY losses DESC.

Type 2

1. Which of the following is not a valid DBMS?


A. SQL Server
B. C++
C. Oracle

D. DB2
2. A table is divided into databases.
A. True
B. False

3. A column is divided into tables.


A. True
B. False

4. What is the set of possible values for a column?


A. Domain
B. Table
C. SQL
D. Index

5. What specifies how the information in an entity is organized?


A. Domain
B. Table
C. SQL
D. Sort key

6. First normal form says:


A. No nonkey columns depend on another nonkey column.
B. Every column that's not part of the primary key is fully dependent on the primary
key.
C. Eliminate repeated fields.
D. None of the above

7. Second normal form says:


A. No nonkey columns depend on another nonkey column.
B. Every column that's not part of the primary key is fully dependent on the
primary key.
C. Eliminate repeated fields.
D. None of the above

8. Third normal form says:


A. No nonkey columns depend on another nonkey column.
B. Every column that's not part of the primary key is fully dependent on the primary
key.
C. Eliminate repeated fields.
D. None of the above

9. What uniquely identifies a row in a table?


A. Index
B. Column
C. Primary key
D. Tuple

10. A composite key is a column containing unique information.


A. True
B. False
11. Which is not a step of the database design process?
A. Create the tables
B. Create the relationships
C. Investigate
D. Add the data

12. When creating a table in SQL, you must specify whether the column is NULL or
NOT NULL.
A. True
B. False

13. The SQL INSERT INTO statement allows adding multiple records in one
statement.
A. True
B. False

14. By default, data returned by the SQL SELECT statement is in descending order.
A. True
B. False

15. Which of the following SQL SELECT options is used to organize the data being
returned?
A. ORDER BY
B. SORT BY
C. WHERE
D. None of the above
Chapter 9
Type 1
1. Describe the uses of an array.
F. Arrays are used for storing similar kinds of information in memory. This
information can be sorted or left in the order it was entered in the array
2. How would you define an array to keep track of five students' ID numbers (integer
value) and their final averages, rounded to the nearest whole number (integer
value)?
F. Int [ ][ ] astudentid = new int [5] [5] ;
3. Using the array to keep track of five students' ID numbers (integer value) and their
final averages , write the statements to store information for the five students' ID
numbers and final averages in each array element.
F. Int astudentid [ ] [ ] = { {32, 12, 18, 54, 22}, {10,11,12,13,14} } ;
4. Describe in your own words how a stack works.
F. Stacks are similar to an all-you-can-eat buffet. Restaurants provide plates for
customers. The plate holder is spring loaded, and as the customer removes a plate
from the stack, every plate moves up one position.
5. Describe in your own words how a queue works.
F. Similar to waiting for a ride at an amusement park. The first person in line is the
first person to get on the ride and leave the line, whereas the last person in line waits
the longest to get on the ride and leave the line.
6. Describe in your own words how a binary tree works.
F. A binary tree is like a family tree. It represents data in an orderly fashion and is
useful for list-like data speeding up searches.
7. Show each step to sort the data by using a bubble sort (use figure Data structure-
1).
F. 2, 32, 4, 7, 10, 25;
F. 2, 4, 32, 7, 10, 25;
F. 2, 4, 7, 32, 10, 25;
F. 2, 4, 7, 10, 32, 25;
F. 2, 4, 7, 10, 25, 32;
8. Show each step to sort the data by using a selection sort (use figure Data
structure-1).
F. 2, 4, 7, 32, 25, 10;
F. 2, 4, 7, 10, 25, 32;
9. Show each step to sort the data by using a bubble sort (use figure Data structure-
2).
F. 1, 5, 32, 30, 2, 20;
F. 1, 2, 5, 32, 30, 20;
F. 1, 2, 5, 20, 32, 30;
F. 1, 2, 5, 20, 30, 32;
10. Show each step to sort the data by using a selection sort (use figure Data
structure-2).
F. 1, 32, 30, 5, 2, 20;
F. 1, 2, 30, 5, 32, 20;
F. 1, 2, 5, 30, 32, 20;
F. 1, 2, 5, 20, 32, 30;
F. 1, 2, 5, 20, 30, 32;
11. What is the maximum height of the tree (use figure Data structure-3)?
F. The height of the tree is: 4
12. On what level is the node with the value 15 (use figure Data structure-3)?
F. The node with the value 15 is on level 3.
13. Show the steps to find the value 7 (use figure Data structure-3).
F. 1-Start at the root node.
F. 2-Does the value 7 = the root value (21)? No.Then is the value 7 > the root value
(21) No Move left child (19).
F. 3-Does the value 7 = the root value (19)? No. Then is the value 7 > the root value
(19) No Move left child (10).
F. 4-Does the value 7 = the root value (10)? No. Then is the value 7 > the root value
(10) No. Move left child (7).
F. 5-Does the value 7 = the root value (10)? Yes. Stop traversing the tree.
14. Show the steps to find the value 17 (use figure Data structure-3).
F. 1-Start at the root node.
F. 2-Does the value 17 = the root node 21? No.Then is the value 17 > the root value
(21)? No.Move left child (19).
F. 3-Does the value 17 = the root value 19? No.Then is the value 17 > the root value
(19)? No.Move left child (10).
F. 4-Does the value 17 = the root value 10? No.Then is the value 17 > the root value
(10)? Yes.Move right Child (15)
F. 5-Does the value 17 = the root value 15? No.Then is the value 17 > the root value
(15)? Yes.Move right Child (17)
F. 6-Does the value 17 = the root value 17? Yes.Stop traversing the tree.

Type 2

1. A(n) __________ is a data structure consisting of contiguous memory locations.


A. Array
B. Stack
C. Queue
D. Tree

2. A(n) __________ is used in an array to access each element.


A. Index
B. Subscript
C. Both a and b
D. None of the above

3. A single array can contain information of different data types (integers, characters,
decimals, and so on).
A. True
B. False

4. The statement char[] aanswers = new char[5] declares an array that has memory
locations of 1 through 5.
A. True
B. False

5. The offset is used to specify the distance between memory locations.


A. True
B. False

6. Arrays are a good data structure to use with dynamic data.


A. True
B. False
7. A stack uses a LIFO structure.
A. True
B. False

8. A queue uses a FIFO structure.


A. True
B. False

9. LIFO is an acronym for:


A. List in, first order
B. Last in, first out
C. Last in, first order
D. List in, first out

10. FIFO is an acronym for:


A. First in, first out
B. First in, first order
C. First in, final out
D. First in, final order
12. What is the number of nodes on level 3 (use figure Data structure-4)?
F. 4
13. What is the number of nodes on level 4 (use figure Data structure-4)?
F. 2
14. What is the maximum height of the tree (use figure Data structure-4)?
F. 4
15. How many right child nodes are there (use figure Data structure-4)?
F. 1
17. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.How many comparisons does it take to find the
number 4?
F. 4

18. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.How many comparisons does it take to find the
number 11?
F. 11
19. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.What is the maximum height of the tree?
F. 11
20. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.On what level is the number 6?
F. 5

Chapter 10 Type 1

1. Describe what a file system does.


F. A file system is the part of the OS responsible for creating, manipulating,
renaming, copying and moving files to and from storage devices.
2. Describe the key characteristics of FAT.
F. Keep tracks of which clusters are using (available for writing, used, and bad)
3. Describe how a drive becomes fragmented.
F. Occurs when files' clusters are scattered in different locations on the storage
medium.
4. Explain how defragmentation works and how it can improve system performance.
F. Defragmentation works by putting "chunks of data" back into contagious blocks
F. Your computer hard drive doesn't have to spin as much to get the information
5. How does FAT differ from NTFS, and when is each used?
F. The main advantage of FAT is its efficient use of disk space.
F. One more advantage of using FAT is how easy it is to recover files.
F. NTFS is used when journaling and metadata support is required.
F. FAT although an older file system is used when data recovery is essential and
disk sixe is small
6. What are the advantages and disadvantages of FAT?
F. The main advantage of FAT is its efficient use of disk space.
F. File names can be up to 255 characters and file extensions longer than 3
characters.
F. Easy to recover file names that have been deleted
F. Overall performance slows down as more files are stored on the drive. Drives can
become fragmented quite easily.
F. Lacks many of the security features in NTFS such as being able to assign access
rights to files and directories.
F. It can also have file integrity problems such as lost clusters, invalid files and
directories and allocation errors.
7. Describe the key characteristics of NTFS.
F. Master File table and Journaling
8. What are the advantages and disadvantages of NTFS?
F. Makes file access fast and reliable.
F. With the MFT, the file system can recover from problems without losing a lot of
data
F. Security has been improved compared with FAT.
F. Finally NTFS includes a file attribute that controls file compression
F. It is not recommended as a file management system on volumes smaller than
4GB.
F. Cannot access NTFS volumes from MS-DOS, Win 95 or Win 98.
9. Describe the Master File Table (MFT) and how it works.
F. The MFT is used to store data about every file and directory [Meta-Data] on the
volume
F. OS uses data in this table to retrieve files.
F. Data stored in the MFT includes a file's size, name, and permission among other
information.
10. What are the advantages and disadvantages of file compression?
F. It minimizes the amount of disk space needed, and the entire process is
transparent to the user.
F. It slows performance and you cannot encrypt a compressed file.
11. What's the difference between a text file and a binary file?
F. Text file Consist of ASCII or Unicode characters. Text files are typically read with
word processing programs
F. Binary file cannot be read with word processing programs.
12. How does sequential file access differ from random file access?
F. A sequential file is accessed starting at the beginning of the file and is processed
to the end of the file.
F. Accessing a particular record in a file is faster if you can position the read/write
head directly on the record without having to read all the records in-front of it.

13. What are the strengths and weaknesses of sequential file access and random
file access?
F. The advantage of sequential file access is that because data is appended to the
end of the file, the writing process is fast.
F. The disadvantage is that retrieving data can be extremely slow, depending of the
data's location.
F. The advantages of random file access are getting to a particular file faster and
being able to update the record in place.
F. The disadvantage is that disk space can be wasted if data does not fill the entire
record or if some record numbers do not have data.
14. Explain how hashing works.
F. Hashing uses a hashing algorithm to generate a unique value called a hash key
for each record.
F. The hash key is then used as a key value in a list of rows or records of
information.
F. Combining hash keys establishes an index.

Type 2
1. Which of the following is not a responsibility of the file system?
A. Creating files
B. Manipulating files
C. Renaming files
D. Copying files
E. None of the above

2. Sectors are made up of clusters.


A. True
B. False

3. In FAT, files don't need to be stored in a contiguous block of memory.


A. True
B. False

4. Which of the following FAT formats allows the largest volume size?
A. FAT12
B. FAT16
C. FAT32
D. All FAT formats have the same maximum volume size.

5. Which tool is used to reorganize clusters so as to minimize drive head movement?


A. Disk Defragmenter utility
B. Sequential Access utility
C. FAT
D. NTFS

6. FAT32 provides the capability to assign access rights to a file and directory.
A. True
B. False

7. Which is not an advantage of using NTFS?


A. Journaling
B. File encryption
C. Efficient disk use on small volumes
D. Security

8. Which is not a file system used in Linux?


A. HFS+
B. XFS
C. JFS
D. Ext3

9. You're tracking information on rocket launches. Each launch is assigned a number


from 1000 to 100000. There will probably be around 5000 launches, and you're using
a hashing algorithm that divides the highest possible number of launches by the
expected number of launches. What is the hashing algorithm key in this situation?
A. 200
B. 20
C. 500000
D. 5000000
10. Using the information from problem (Each launch is assigned a number from
1000 to 100000. There will be around 5000 launches, and you're using a hashing
algorithm that divides the highest possible number of launches by the expected
number of launches), if you have a rocket launch number of 80000, what is the
relative record?
A. 4000
B. 400
C. 50
D. 5000

Chapter 11 Type 1

1. What is an algorithm?
F. A logically ordered set of statements used to solve a problem.
2. Write an algorithm for calculating your checkbook balance.
F. If amount is to be deposited, add it to current balance;
F. If the amount is to be withdrawn, subtract it from the current balance.
3. Write the pseudocode for a program that can calculate your checkbook balance.
F. Ask for the current balance of the chequing account;
F. Ask if deposit or withdraw;
F. Ask for amount;
F. Ask for date;
F. If deposit, then current balance = current balance + amount;
F. Else if current balance = current balance - amount;
F. Store information

4. Write the pseudocode describing how you get to school.


F. Turn off alarm;
F. Get out of bed;
F. Shower and take care of bathroom neceeitiles;
F. Eate breakfast;
F. Grab books and keys;
F. Get in the car;
F. Drive to school;
F. Park car;
F. Run to class and avoid being late;

Type 2
1. Which is not an example of a high-level programming language?
A. Ada
B. Boolean
C. C++
D. Java

2. Which of the following converts source code into a computer language and results
in an executable file?
A. Compiler
B. Interpreter
C. IDE
D. Algorithm

3. Which of the following translates a program's statements, one by one, into a


language the computer can understand?
A. Compiler
B. Interpreter
C. IDE
D. Algorithm

4. Pseudocode should be written after the source code to ensure that the program
was written correctly.
A. True
B. False
5. Which is not a type of programming language?
A. Low-level
B. Assembly
C. High-level
D. Machine
E. None of the above

6. The only language computers can understand consists of 1s and 0s.


A. True
B. False

7. All languages include an integrated development environment (IDE).


A. True
B. False

8. What is a name used to identify a specific location and value in memory?


A. Variable
B. Operator
C. Control structure
D. Object

9. What is the final result of the expression 5 + 2 * 4 - 2?


A. 26
B. 11
C. 9
D. 0
E. Can't be determined

10. What is the final result of the expression 5 % 4 + 3 - 2?


A. 2
B. 6
C. 1
D. 0
E. Can't be determined

11. The post-increment operator increments the variable and then processes the
remainder of the statement.
A. True
B. False

12. The preincrement operator increments the variable and then processes the
remainder of the statement.
A. True
B. False

13. Which is not a type of control structure?


A. Invocation
B. Top down
C. Algorithm
D. Selection

Chapter 12
Type 1
1. Describe what the process of software engineering includes.
F. SE is the process of producing software application.
F. It involes not just the source code but also documentation
2. What is a design document, and how does it affect software engineering?
F. A design document details all the application’s design issues.
F. It includes its functionality, appearance and distribution.
F. Without a well-defined design document, a project is doomed to failure.
F. Creating a design document is based on good communication with end users in
determining the application's and requirements.
3. Write the pseudocode steps for a program that processes a savings deposit in an
ATM.
F. Prompt for card;
F. When card is entered, read card;
F. Ask for PIN;
F. Confirm that PIN matches card;
F. If there is a match, continue with transaction. Otherwise display an error message;
F. As for dollar amount to add to savings;
F. Add dollar amount to savings and update the account.
F. Ask if they would like to make another transaction.If so,continue by going back to
Step 6. Otherwise, display a thank you message and quit
F. Eject card.

4. Write the pseudocode steps for a program that processes a savings withdrawal
from an ATM.
F. Prompt for card.
F. When card is entered, read card.
F. Ask for PIN.
F. Confirm that PIN matches card.
F. If there is a match, continue with transaction. Otherwise display an error message.
F. As for dollar amount to remove from account.
F. Subtract dollar amount from account and update the account.
F. Ask if they would like to make another transaction.If so,continue by going back to
Step 6. Otherwise, display a thank you message and quit
F. Eject card.

5. How can UML help a developer create a program that meets an end user's
needs?
F. UML is a software modeling process that enables developers to create a blueprint
showing the overall functionality of the program
F. It provides a way for clients and developers to communicate

6. How is a data dictionary used in software development?


F. A data dictionary is a document defining the structure of the database, and
describing the type of data used in the program, and showing table definitions,
indexes, and other data relationships
7. What is a prototype, and how is it used in software engineering?
F. A prototype is a typical example that gives end users a good idea of what they’ll
see when their application is completed
F. The result should be a product agreed by both the user and the developer, thus
promoting good communication throughout the process
8. What are some mistakes you can make in designing and developing a software
program?
F. Not including the end user in the design process.
F. Writing your application without getting user approval for the prototype.
F. Not testing the application.
F. Using poor coding procedures.
F. Not creating a design document.
F. Thinking that end users do not know what they want, so you tell them what they
are going to get.
9. Describe the steps in the waterfall SDLC model.
F. Gather all the requirements for the project.
F. Design the system and software.
F. Implement application.
F. Test application.
F. Put it in operation ang maitain
10. List each software development team role and describe the job function.
F. Project Manager: Leader of the team, responsible for choosing the right players
for the right positions, determining the projects'risks, cost and schedule of tasks, and
keeping the project on schedule.
F. Database Administrator (DBA): Person assigned the role of creating and
maintaining the database
F. Software developer: Person responsible for writing source code to meet end
users'functional requirements.
F. Client: A person who has a need that can be met through the process of software
engineering
F. Tester: Person responsible for making sure the program functions correctly and
meets all the functional requirements specified in the design document
F. Consumer relations representative: Person responsible for interacting with testers,
developers and end users during the product's creation and early release and on an
ongoing basis with the end users as long as the product is being used
11. Write the pseudocode for using a microwave to heat a TV dinner for 2 minutes.
F. Open microwave door.
F. Place food inside microwave.
F. Press the cook level button.
F. Select high ? Press the cook time button.
F. Enter 2 minutes.
F. Press the start button.
F. When the timer goes off, open door.
F. Remove food.
F. Close door.
12. Write the pseudocode for making a purchase on the Internet.
F. Go to the web site URL.
F. Enter login name.
F. Enter password.
F. Click the login button.
F. Type item description in search area.
F. Click the Search button.
F. If found, enter quantity and click “Add item to shopping cart.”
F. If not found, display error message and return to screen.
F. Click the Checkout button.
F. Confirm information and click the Confirm Order button.
F. Click the Logout button.
13. Write the pseudocode for an application that allows a professor to keep track of
the following information for each student:10 homework assignments, 4 quiz scores,
and 2 test scores. The application should calculate the average grade for each type
of information (homework, quizzes, and tests), and then calculate a final grade by
averaging all three average scores.
F. Enter Student ID.
F. Input 10 homework scores.
F. Calculate the homework average score.
F. Input 4 quiz scores.
F. Calculate the quiz average score.
F. Input 2 test scores.
F. Calculate the test average score.
F. Calculate the final average (homeworkavg + quizavg + testavg) / 3

Type 2
1. End users need to be told what they want and how the program should work.
A. True
B. False

2. Which is not included as a task of software engineering?


A. Communicating with clients in meetings
B. Designing screens
C. Writing the application
D. Creating a design document
E. None of the above

3. A design document is used as:


A. A way to bill the client more
B. A blueprint that shows an application's functionality
C. A replacement for pseudocode when writing a program
D. None of the above
4. Which is not part of the SDLC?
A. Project feasibility
B. Software design
C. Software implementation
D. Software proposal to client
E. All of the above

5. Which is not a valid software development model?


A. Waterfall
B. Degradation
C. Evolution
D. Spiral
E. Incremental

6. UML was designed to:


A. Assist developers in creating visual models of the application's
functionality
B. Assist developers in designing screens and reports
C. Incorporate object-oriented design into application development
D. Replace the outdated notion of pseudocode

7. The best way to write a good program is to have an initial meeting with the end
user to find out the requirements for the project, go back to your office and write the
program, and then deliver the finished product for installation.
A. True
B. False

8. The document responsible for describing the type of data stored in the database is
called the:
A. Design document
B. Data dictionary
C. UML diagram
D. SDLC
E. None of the above

9. Including end users during the entire design process is recommended. In fact, you
can even let them help design screens and reports.
A. True
B. False

10. A ... Is used as a visual model for describing a program's logical steps.
A. Flowchart
B. Class diagram
C. Use case diagram
D. Design document
E. None of the above

11. A ... Is a standard or typical example of how something might work, but without
all the built-in functionality.
A. Flowchart
B. Prototype
C. Design document
D. Data dictionary
E. None of the above

12. Which should not be included in the design document?


A. Project objectives and requirements
B. Cost analysis
C. Feasibility study
D. Copies of screens and reports
E. None of the above

13. Scope creep is good for a project because it's one of the software development
life cycles.
A. True
B. False

14. If end users or testers find a bug in the application, you should find out why they
insist on breaking the program and get them some training so that they will stop
making it crash.
A. True
B. False

15. The tester's role is not as critical as other team roles and should be the first role
eliminated if the project is behind the scheduled completion date.
A. True
B. False

____ involves dividing messages into blocks that can be reassembled at their
destination, with each block possibly following a different path.
Select one:
a. Multiplexing
b. Packet switching
c. Linking
d. Decoding

Which of the following operating systems was developed jointly by IBM and
Microsoft?
Select one:
a. NOS
b. Linux
c. OS/2
d. Unix
In its antitrust suit with the government, Microsoft claimed which of the following
programs was an integral part of the operating system?
Select one:
a. Internet Explorer
b. Navigator
c. Mosaic
d. MS-Word

The Macintosh had the first mass-produced ____ , an interface that uses graphical
instead of text commands.
Select one:
a. ARPA
b. GUI
c. SMP
d. MPP

The term ____ computing or ____ architectures refers to linking a number of CPUs
to work on a task simultaneously.
Select one:
a. monolithic
b. serial
c. sequential
d. parallel

ENIAC was a functioning and useful computer that could perform both arithmetic and
____ operations.
Select one:
a. linguistic
b. logical
c. surgical
d. standard

Which of the following war-time activities caused the U.S. Navy Board of Ordinance
to sponsor the development of the first modern electronic computer?
Select one:
a. map-making
b. aerial reconnaissance
c. weapons development
d. ship building

The loose collection of networks called "the Internet" is the short form of which of the
following words?
Select one:
a. internexus
b. internetwork
c. interconnect
d. interarpanet
Using the Berners-Lee protocols, Marc Andreesen created the browser that had the
most impact beyond the walls of academia: ____.
Select one:
a. Internet Explorer
b. Mosaic
c. Impact
d. Next

Herman Hollerith introduced electromechanical counting equipment using ____ as


input.
Select one:
a. punch cards
b. magnetic tape
c. voice patterns
d. keyboard entry

In the fifth generation of electronic computing, modular approaches to coding, such


as ____ , facilitate larger, more complex, and more quickly and reliably delivered
software products.
Select one:
a. machine programming
b. binary programming
c. object-oriented programming
d. assembly programming

IBM's first multipurpose machine was called which of the following?


Select one:
a. EDVAC
b. ENIAC
c. UNIVAC
d. Mark I

In Western society, you can probably credit the 1622 invention of the ____as the
beginning of the solution of complex mathematical problems by mechanical devices
with moving parts.
Select one:
a. slide rule
b. logarithm
c. transit
d. abacus

In 1977, Apple released the ____ based upon the Motorola 6502 processor.
Select one:
a. Apple I
b. iPod
c. Macintosh
d. Apple II
In 1823 ____ invented a mechanical device that did addition, subtraction,
multiplication, and division of 6-digit numbers.
Select one:
a. Gottfried Leibniz
b. Charles Babbage
c. Thomas Jefferson
d. Blaise Pascal

Which of the following was the first commercially viable computer?


Select one:
a. UNIVAC
b. ENIAC
c. EDVAC
d. Mark I

Based on low cost, available source code, and reputed reliability, which of the
following operating systems presents the greatest competitive threat to Windows?
Select one:
a. Star
b. Crescent
c. OS/2
d. Linux

A(n) ____ network consists of computers that independently decide how to channel
to the next computer.
Select one:
a. centralized
b. distributed
c. concentrated
d. monolithic

Fiberoptics and wireless technologies have given rise to which of the following
terms?
Select one:
a. WAN
b. WLAN
c. Internet
d. LAN

The integration of Internet Explorer with the dominant Windows operating system
was the turning point in what came to be known as the "____".
Select one:
a. network nightmare
b. Internet affair
c. code conflict
d. browser wars
Assembly language, while easier to use than machine code, has what type of
correspondence with machine code?
Select one:
a. one-to-one
b. many-to-many
c. one-to-many
d. many-to-one

Both the Jacquard loom and the player piano had a "____".
Select one:
a. disk drive
b. keyboard
c. monitor
d. stored program

According to general consensus, which of the following companies won the


mainframe battle of the first electronic computer generation?
Select one:
a. Remington Rand
b. RCA
c. Honeywell
d. IBM

Which of the following technologies made electronic computing possible?


Select one:
a. vacuum tubes
b. reusable pins
c. punch cards
d. keyboards

The concept of computer design that allows for future modifications and additions by
members of the public is known as which of the following?
Select one:
a. licensed architecture
b. closed architecture
c. proprietary architecture
d. open architecture

When you are diagramming and creating flowcharts, you are principally engaged in
____ tasks.
Select one:
a. Web
b. network repair
c. office
d. programming
Grammar check and font selection are common features of which of the following
tools?
Select one:
a. text editor
b. browser
c. word processor
d. binder

UML or Universal ____ Language diagrams are used to develop object-oriented


systems and programs.
Select one:
a. Modeling
b. Middling
c. Master
d. Markup

Creating documents, presentations, and spreadsheets are best classified as ____


tasks.
Select one:
a. programming
b. Internet
c. office
d. scientific

Which of the following programming environments is actually a platform hosting a


number of distinct languages?
Select one:
a. Rhodes
b. Microsoft.NET
c. CodeConqueror
d. Borland JBuilder

Graphics software available in the form of ____ is generally free of charge during a
trial period.
Select one:
a. adware
b. malware
c. shareware
d. middleware

In addition to redundant areas, ____ compression techniques eliminate information


not perceptible to the human eye.
Select one:
a. lossy
b. lossless
c. primary
d. secondary
The 16.7 million color palette of the BMP format requires ____ bits.
Select one:
a. 32
b. 16
c. 20
d. 24

Images reduced by ____ compression techniques retain their original quality.


Select one:
a. lossless
b. sassy
c. glossy
d. lackless

Data ____can be used to reduce the sizeof a file and speed thetransmission ofthe
file through e-mail.
Select one:
a. collaboration
b. inlining
c. design
d. compression

A grid-like document that facilitates arithmetic manipulation and presentation is


called a ____.
Select one:
a. spreadsheet
b. fax
c. memo
d. resume

Text editors, compilers, and debuggers are directly featured on the menu of which of
the following software tools?
Select one:
a. spreadsheet
b. word processor
c. Integrated Development Environment
d. desktop publisher

File ____ Protocol (or FTP) is a transmission method used to send files across the
Internet.
Select one:
a. Table
b. Transfer
c. Task
d. Test
To flip an image upside down, the user would ____ it 180 degrees.
Select one:
a. rotate
b. scale
c. crop
d. resize

The process of changing image format from one type to another is called ____.
Select one:
a. blurring
b. cropping
c. rotating
d. conversion

A ____ is a collection of information usually organized into tables.


Select one:
a. multiplex
b. browser
c. publisher
d. database

Which of the following graphical formats should be favored for animation and small
file size?
Select one:
a. TIF
b. GIF
c. JPG
d. BMP

The ____ extension is one of the more popular compression formats in the world of
Windows.
Select one:
a. .zip
b. .car
c. .exe
d. .bat

A ____ is a generic tool that allows you to do basic editing, although the finished
document won't have a professional look.
Select one:
a. text editor
b. GUI
c. spreadsheet
d. word processor
____ is a graphics tool popular with Web designers.
Select one:
a. Tron
b. Redux
c. Macromedia Fireworks
d. Starry Messenger

A ____ tool is the most logical choice for the development of a slide show.
Select one:
a. word processing
b. spreadsheet
c. scheduling
d. presentation

Which of the following tools specializes in sophisticated page layout?


Select one:
a. spreadsheet
b. text editor
c. project scheduler
d. desktop publisher

____ in the form of logos, cartoons, and maps play a large part in the world of
information sharing.
Select one:
a. Graphics
b. Databases
c. Texts
d. Protocols

Which of the following tools has the primary focus of enhancing a Web site?
Select one:
a. Microsoft Project
b. Microsoft PowerPoint
c. Borland Delphi
d. Macromedia Flash MX

Which of the following e-mail software brands is widely used in the UNIX and Linux
world?
Select one:
a. Pine
b. Redwood
c. Oak
d. Maple

The concept of ____ value is common to all modern numbering systems.


Select one:
a. deterministic
b. random
c. radical
d. positional
____ patterns contain information about the color and brightness of a pixel.
Select one:
a. Octal
b. Hexadecimal
c. Binary
d. Decimal

To find the ____ of a given bit, flip it to the opposite state.


Select one:
a. sign
b. complement
c. position
d. root

The hexadecimal numbering system runs out of digits after ____.


Select one:
a. F
b. E
c. H
d. G

A ____ is the smallest unit that can be displayed on a computer monitor.


Select one:
a. pixel
b. micron
c. picon
d. twip

The computer samples sound at fixed intervals and each sample is assigned a
binary value according to its ____.
Select one:
a. period
b. pitch
c. frequency
d. amplitude

Each hexadecimal digit relates directly to a ____-bit binary pattern.


Select one:
a. 16
b. 4
c. 2
d. 8

A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off).
Select one:
a. nibble
b. word
c. bit
d. byte
In scientific notation, the method of displaying numbers uses a(n) ____ and an
exponent.
Select one:
a. ordinate
b. asymptote
c. abscissa
d. mantissa

What is the result of converting the decimal number 25 to a base 16 equivalent?


Select one:
a. 31
b. 19
c. 1A
d. F

What binary number results from adding 111(2) and 111(2)?


Select one:
a. 1111(2)
b. 1011(2)
c. 1110(2)
d. 1000(2)

Unicode character representation uses a(n) ____ bit standard.


Select one:
a. 4
b. 16
c. 8
d. 7

The decimal equivalent of 100(16) is ____.


Select one:
a. 1600
b. 256
c. 160
d. 116

Various ____ techniques have been designed to allow the same image information
to be stored in a smaller file.
Select one:
a. resolution
b. compression
c. consolidation
d. scanning
The eight bit extended ASCII (American Standard Code for Information Interchange)
character set can be used to represent ____ characters.
Select one:
a. 512
b. 34,168
c. 256
d. 128

Which of the following methods represents the most common way of storing signed
numbers?
Select one:
a. two's complement
b. one's complement
c. integer complement
d. binary complement

According to positional value, the binary number 10101(2) represents ____ things.
Select one:
a. 12
b. 5
c. 21
d. 3

Displays containing the contents of a computer's memory or the hard disk are often
referred to as ____ memory dumps.
Select one:
a. decimal
b. error
c. hexadecimal
d. octal

A ____ is a group of eight bits.


Select one:
a. nibble
b. byte
c. word
d. blip

A ____ is identified by the number of digits a numbering system has, including zero.
Select one:
a. base
b. root
c. discriminant
d. determinant
What is the result of converting the decimal number 25 to a base 2 equivalent?
Select one:
a. 10001(2)
b. 11101(2)
c. 10011(2)
d. 11001(2)

Which of the following is an example of a video compression format?


Select one:
a. GIF
b. MPEG
c. BMP
d. TIF

A sound consists of a waveform that has amplitude (volume) and a ____ (pitch).
Select one:
a. frequency
b. phase shift
c. phase angle
d. period

The number 10^(-4) evaluates to which of the following?


Select one:
a. 10000
b. 0.000001
c. 0.00001
d. 0.0001

An 8-nibble word is more likely to be referred to as the equivalent ____-byte word.


Select one:
a. 4
b. 8
c. 16
d. 2

Which of the following is a primary function of an operating system?


Select one:
a. generating flowcharts
b. solving differential equations
c. generating documents
d. managing resources
____ are characters that are used to match any character at the end of a file name to
a particular file extension.
Select one:
a. Aces
b. Wildcards
c. Deuces
d. Jokers

A program that is currently executing is called a ____.


Select one:
a. process
b. regular routine
c. JCL
d. code segment

All programs and processes running on a computer are stored in ____.


Select one:
a. RAM
b. NOS
c. ROM
d. CMOS

Which of the following operating systems was designed to accommodate multiple


users and multiple tasks?
Select one:
a. Windows 3.0
b. UNIX
c. CP/M
d. DOS

Interface programs that allow a computer to interact with peripheral devices are
called ____.
Select one:
a. applets
b. monitors
c. shell scripts
d. drivers

Which of the following terms refers to computing with more than one CPU?
Select one:
a. multilayering
b. multiprocessing
c. multitasking
d. multileveraging
In DOS, you can enter ____ <command> to get more details concerning a particular
command.
Select one:
a. ASSIST
b. SUPPORT
c. HELP
d. AID

Wildcard specifications are case sensitive in ____.


Select one:
a. UNIX
b. MAC OS
c. DOS
d. Windows XP

The process of ____ arranges the disk surface into addressable areas and sets up
the basic directory tree structure on the disk.
Select one:
a. shaping
b. templating
c. organizing
d. formatting

____ are simply broad divisions of the total capacity of the disk into specific OS
areas.
Select one:
a. Partitions
b. Portions
c. Categories
d. Segments

The ____ is the core of the OS.


Select one:
a. scheduler
b. file manager
c. kernel
d. GUI

In Unix or Linux, entering ____<command> gives you the manual on the command
that you specify.
Select one:
a. help
b. man
c. HELP
d. MAN
Which of the following commands enables UNIX to partition a disk drive?
Select one:
a. FDISK
b. pdisk
c. PDISK
d. fdisk

Console operating systems prompt users to interact through a(n) ____ line.
Select one:
a. flow
b. command
c. programming
d. operational

A situation known as ____ occurs when all active processes are tied up in a circular
wait for resources.
Select one:
a. context switch
b. safe mode
c. synchronization
d. deadlock

Partitioning, ____, and folder creation are all done to prepare a disk to receive files.
Select one:
a. signaling
b. formatting
c. scanning
d. rebooting

In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied.
Select one:
a. Refuse
b. Remainder
c. Recovery
d. Recycle

Which of the following operating systems supports multitasking?


Select one:
a. CP/M
b. MS-DOS
c. Apple II
d. Windows XP

Moving files is similar to ____ files.


Select one:
a. deleting
b. closing
c. opening
d. copying
The operating system running on a computer is often called its ____ and is typically
tied to a particular CPU.
Select one:
a. intermediary
b. platform
c. driver
d. support

The operating system reallocates the CPU through a program known as a(n) ____
handler.
Select one:
a. disruption
b. interrupt
c. job
d. control

Time-____ is a method that allows multiple processes to share the CPU.


Select one:
a. switching
b. slicing
c. solving
d. sourcing

The main directory level is also called the ____ level.


Select one:
a. child
b. leaf
c. root
d. primary

Operating systems allow you to organize files into structures called folders or ____.
Select one:
a. arrays
b. directories
c. vectors
d. stacks

In a _____ topology, one of the computers or a network device serves as a hub for
all messages.
Select one:
a. bus
b. grid
c. star
d. ring
Normal telephone voice-grade lines use what is called _____-division multiplexing to
divide up the bandwidth among the subscribers.
Select one:
a. wave
b. phase
c. frequency
d. amplitude

Twisting copper wires nearly eliminates the electromagnetic effect known as _____.
Select one:
a. resonance
b. impedance
c. resistance
d. inductance

Each layer in the OSI model is defined in terms of a(n) _____ and a protocol data
unit.
Select one:
a. abstract
b. comment
c. header
d. brief

The tendency of a signal to become weaker over distance is known as _____.


Select one:
a. amplification
b. attenuation
c. amelioration
d. alienation

_____ convert binary digits into sounds by modulating or modifying a tone.


Select one:
a. Modems
b. Transceivers
c. Oscilloscopes
d. Transformers

A widely used technology that has become an industry standard for LANs is _____.
Select one:
a. FDDI
b. Ethernet
c. token ring
d. ATM

The Transport layer of the OSI model uses data units called _____.
Select one:
a. bytegrams
b. words
c. bitgrams
d. datagrams
Cable is theoretically capable of speeds up to _____.
Select one:
a. 42 Mbps
b. 420 Mbps
c. 4.2 Mbps
d. 42 Gbps

The normal copper wire is capable of carrying _____ voice channels.


Select one:
a. 48
b. 16
c. 4
d. 24

Network configurations are often referred to as network _____.


Select one:
a. arrangements
b. organizations
c. structures
d. topologies

The PCI system bus consists of _____ wires.


Select one:
a. 20
b. 198
c. 98
d. 10

A(n) _____ is a set of rules designed to facilitate communication.


Select one:
a. accord
b. protocol
c. procedure
d. code

A(n) _____ diagram shows the protocol interactions between two entities.
Select one:
a. assignment
b. hierarchy
c. timing
d. flow

Because of attenuation, a DSL subscriber is required to be no more than _____ feet


away from the nearest telephone company switching office.
Select one:
a. 18,000
b. 12,500
c. 1,800
d. 6,500
_____ media are physical media such as copper wire or fiber-optic cable.
Select one:
a. Oriented
b. Guided
c. Directed
d. Undirected

A _____ is a relatively small number of computers connected together in close


proximity, usually within a building or complex.
Select one:
a. WAN
b. DAN
c. MAN
d. LAN

_____ measures the speed a transmission medium is able to handle in bits per
second.
Select one:
a. Byte capacity
b. Bandwidth
c. Bit capacity
d. Broadwidth

_____ pulses allow transmission rates up to 4 Mbps.


Select one:
a. X-ray
b. Infrared
c. Microwave
d. Ultraviolet

Which of the following WAN technologies use the same unguided media as
television?
Select one:
a. satellite
b. cable
c. dial-up
d. DSL

The _____ layer of the OSI model is responsible for translation, formatting, and
syntax selection.
Select one:
a. Data Link
b. Application
c. Session
d. Presentation
Fiber-optic cables use _____ fibers to guide light pulses along a cable.
Select one:
a. tungsten
b. glass
c. plastic
d. ceramic

The OSI conceptual model for the communication process has _____ discrete
layers.
Select one:
a. nine
b. seven
c. four
d. five

A _____ is a device designed to protect an internal network or node from intentional


or unintentional damage from an external network.
Select one:
a. gate
b. firewall
c. barricade
d. fence

_____ direct network traffic based on the logical (IP) addresses assigned at the third
layer of the OSI stack.
Select one:
a. Hubs
b. Bridges
c. Routers
d. Gateways

_____ formats content for display in a browser and transfers information via the
Web.
Select one:
a. SGML
b. PHP
c. XML
d. HTML

Your Internet provider maintains a switching center called a _____.


Select one:
a. nexus
b. receive-and-send
c. point-of-presence
d. cusp
When you connect your computer to your _____ you become part of the Internet.
Select one:
a. IP
b. TCP
c. DBA
d. ISP

You can check the network configuration of your computer in Windows by using the
_____ command.
Select one:
a. IPCONFIG
b. IPSETUP
c. NETWORK
d. NETDESIGN

Which of the following computer scientists invented the World Wide Web?
Select one:
a. Donald Knuth
b. E.F. Codd
c. Marc Andreesen
d. Tim Berners-Lee

With _____, multiple computers can share one Internet connection.


Select one:
a. TCP/IP
b. UDP
c. NAT
d. DHCP

HTML and the Web connect one page to another through _____.
Select one:
a. higherjoins
b. hyperlinks
c. overlinks
d. cyberbridges

Crawling makes use of a special program called a bot or _____.


Select one:
a. spider
b. butterfly
c. bug
d. centipede

The problem of having to remember IP addresses was solved by allowing Web


servers to have _____ names.
Select one:
a. domain
b. resource
c. locator
d. range
_____ has been the Internet standard protocol for remote login to a UNIX host.
Select one:
a. IMAP
b. FTP
c. Telnet
d. HTTP

The _____ protocol is used to provide the reliable and efficient transmission of data
files.
Select one:
a. FTP
b. TCP
c. IP
d. UDP

The _____ protocol establishes a virtual circuit with the destination computer to
transmit packets.
Select one:
a. IP
b. FTP
c. HTTP
d. TCP

The total pool of IPv4 addresses is separated into groups, called _____.
Select one:
a. clusters
b. classes
c. entities
d. aggregations

So that packets do not keep bouncing from router to router forever, one of the fields
in the IP header is the _____ field.
Select one:
a. time to live
b. expiration
c. time to expire
d. lifetime

Central to the operation of the IP protocol is the IP _____ of both the source and
destination.
Select one:
a. name
b. address
c. signifier
d. location
The _____ protocol allows each computer to automatically be assigned an IP
address each time it is started up.
Select one:
a. HTTP
b. FTP
c. DHCP
d. TCP

Using _____, a packet can just be sent on an alternate line if the desired line is
damaged or busy.
Select one:
a. linkers
b. switches
c. routers
d. hubs

When you type in a URL in the address bar of your browser, you send a _____
lookup request to the _____ server at your ISP.
Select one:
a. NET
b. SND
c. POP
d. DNS

The port number can be analogized to which of the following address components?
Select one:
a. street address
b. apartment number
c. zip code
d. city

The _____ server is just a computer that is programmed to respond to HTTP


requests.
Select one:
a. Web
b. Protocol
c. Network
d. Internet

TCP and IP protocols map to Transport, Network, and _____ layers of the OSI
model.
Select one:
a. Session
b. Data Link
c. Presentation
d. Application
The _____ protocol establishes a link from an e-mail client to a mail server.
Select one:
a. POP3
b. SMTP
c. IMAP
d. HTTP

Subnets are defined through the use of a subnet _____.


Select one:
a. filter
b. screen
c. sentinel
d. mask

The acronym HTTP stands for _____.


Select one:
a. Hypertext Transfer Protocol
b. Heuristic Transport Type Protocol
c. Hypertext Transition Protocol
d. Hexadecimal Task Test Protocol

_____ languages allow a Web page developer to include dynamic properties.


Select one:
a. Presentation
b. Hosting
c. Staging
d. Scripting

A DBMS must provide or interface with a(n) _____ language to extract information
from the database.
Select one:
a. machine
b. natural
c. query
d. assembly

The set of rules that dictates how databases are designed is called _____.
Select one:
a. normalization
b. invocation
c. standardization
d. customization

The set of possible values for each column is called the _____ of that column.
Select one:
a. range
b. codomain
c. image
d. domain
Data that has been organized and logically related to allow access, retrieval, and use
of that data is called a _____.
Select one:
a. store
b. field
c. database
d. record

Which of the following is a valid SQL clause for sorting returned rows of data?
Select one:
a. CLASS BY
b. SORT BY
c. ARRANGE BY
d. ORDER BY

A _____ key is simply a column or combination of columns that uniquely identifies a


row within a table.
Select one:
a. principal
b. main
c. primary
d. chief

Which of the following commands can be used to add new rows of data to a table?
Select one:
a. INCREASE
b. ADD
c. INCLUDE
d. INSERT

Which of the following SQL key words indicates that data is not required for a
specified column?
Select one:
a. NOT
b. VOID
c. NULL
d. NOTHING

Placing a table into second normal form reduces _____ of data.


Select one:
a. validity
b. quality
c. integrity
d. repetition
A(n) _____ dependency exists when one column is dependent upon another column
that is not the primary key.
Select one:
a. associative
b. relational
c. dysfunctional
d. transitive

Which of the following SQL statements is most commonly used?


Select one:
a. INSERT
b. SELECT
c. DELETE
d. CREATE

SQL statements are closed with a(n) _____.


Select one:
a. colon
b. period
c. exclamation mark
d. semicolon

Which of the following is a valid SQL word used to return data in descending order?
Select one:
a. DESC
b. REV
c. BOTTOM
d. OPP

Which of following is a valid SQL command for constructing a table?


Select one:
a. MAKE TABLE
b. BUILD TABLE
c. SETUP TABLE
d. CREATE TABLE

Which of the following computer scientists made significant contributions to relational


database management?
Select one:
a. Alan Turing
b. John Von Neumann
c. E.F. Codd
d. Grace Hopper
To put the table into the _____ normal form, a separate row needs to be created for
each row-column intersection with more than one value.
Select one:
a. first
b. second
c. fourth
d. third

A visual representation of how all the tables or entities interact to each other in a
database is called a(n) _____ relationship model.
Select one:
a. transitive
b. functional
c. cardinal
d. entity

When the columns are used to determine the sort order of information they are
called _____.
Select one:
a. markers
b. flags
c. tokens
d. keys

_____ shows the numeric occurrences between entities in an ER model.


Select one:
a. Dependency
b. Cardinality
c. Transitivity
d. Functionality

A special language known as _____ is used to query or extract information from


databases.
Select one:
a. Selection Quotation Language
b. Structured Query Language
c. Software Questioning Language
d. Sorting Questions Language

A(n) _____ is a special type of file that occupies its own space and specifies one or
more columns that determine how the information stored in a table is organized.
Select one:
a. tab
b. identifier
c. field
d. index
A(n) _____ defines how one entity works with or relates to another.
Select one:
a. relationship
b. connection
c. union
d. arrangement

A key that is made up of more than one column is called which of the following?
Select one:
a. aggregate
b. union
c. composite
d. joined

A _____ or entity is divided into rows or columns much like a spreadsheet.


Select one:
a. chart
b. table
c. grid
d. box

A(n) _____ key is defined as a column in one table that is part of the primary key in
another.
Select one:
a. secondary
b. composite
c. auxiliary
d. foreign

With arrays, the _____ is used to specify the distance between memory locations.
Select one:
a. width
b. length
c. address
d. offset

Which of the following can be classified as a data structure?


Select one:
a. array
b. integer
c. character
d. float

In order to remove an item from a queue, you would use a _____ operation.
Select one:
a. enqueue
b. dequeue
c. requeue
d. delete
Which of the following routines implements two list structures to perform sorting
operations?
Select one:
a. bubble
b. merge sort
c. quicksort
d. selection sort

The process of a routine calling itself is called _____.


Select one:
a. recursion
b. modularization
c. iteration
d. counting

The computer logically organizes source code into _____ or groups of related
computer commands that perform a task.
Select one:
a. routines
b. functions
c. methods
d. procedures

In the context of the Java programming language, the "_____" keyword tells the
computer that a new array is being created.
Select one:
a. allocate
b. invoke
c. make
d. new

A binary search tree contains _____ components.


Select one:
a. three
b. eight
c. two
d. four

A two dimensional array declared with size [3] [3] may contain how many elements?
Select one:
a. three
b. sixteen
c. six
d. nine
The _____ sort starts with the last element in the list and compares its value to that
of the item just above it in the list order.
Select one:
a. insertion
b. quick
c. bubble
d. heap

What type of data can be stored in an array generated by the statement, "int[ ]
aGrades = new int [5]"?
Select one:
a. integers
b. floats
c. doubles
d. strings

Looking at the top item to inspect it without removing it from the stack is called
_____.
Select one:
a. scanning
b. snooping
c. viewing
d. peeking

The index or _____ tells the computer which memory cell to access in the array.
Select one:
a. arrow
b. pointer
c. subscript
d. superscript

Which of the following operations removes an item from a stack?


Select one:
a. delete
b. eject
c. remove
d. pop

Which of the following sorting routines incorporates a problem solving technique


known as divide and conquer?
Select one:
a. bucket
b. radix
c. quicksort
d. counting
In order to sort data you first need to create a(n) _____ that defines the process for
sorting.
Select one:
a. queue
b. stack
c. algorithm
d. list

A stack _____ keeps track of the top of a stack.


Select one:
a. flag
b. sentinel
c. pointer
d. marker

The _____ sort starts at the first value in the list and then processes each element
looking for the smallest value.
Select one:
a. counting
b. selection
c. merge
d. radix

Backtracking is most efficiently accomplished by using a(n) _____.


Select one:
a. array
b. queue
c. stack
d. tree

In Java, which punctuation mark tells the computer that the end of the statement has
been reached?
Select one:
a. colon
b. comma
c. period
d. semicolon

A _____ represents a hierarchical structure similar to that of organizational or


genealogy charts.
Select one:
a. digraph
b. grid
c. tree
d. network
Which of the following data structures adapts least efficiently to dynamic memory
allocation.
Select one:
a. arrays
b. stacks
c. queues
d. linked lists

The node that begins the tree is called the _____.


Select one:
a. leaf
b. root
c. child
d. branch

A(n) _____ is a memory cell that contains the address of another memory cell as its
data.
Select one:
a. index
b. element
c. token
d. pointer

Which of the following data structures uses a tail pointer?


Select one:
a. array
b. stack
c. binary tree
d. queue

____ file access allows you to mimic the look of a database table by storing
information in the file row by row, similar to a database record.
Select one:
a. Sequential
b. Random
c. Binary
d. Hash

The ____ contains the information needed for the system to be able to know how to
access the volume.
Select one:
a. overflow area
b. file system
c. directory
d. partition boot sector
A(n) ____ is the part of the operating system responsible for creating, manipulating,
renaming, copying, and removing files to and from storage devices.
Select one:
a. overflow area
b. cluster
c. hash key
d. file system

Clusters are also called ____.


Select one:
a. directories
b. overflow areas
c. allocation units
d. algorithms

Which of the following terms describes an organizational unit within a storage


medium that stores files, folders, and subdirectories?
Select one:
a. Fragmentation
b. Volume
c. File compression
d. Directory

____ occurs when files have clusters scattered in different locations on the storage
medium rather than in contiguous locations.
Select one:
a. Disk fragmentation
b. Hashing
c. Clusterization
d. Disk striping

____ is a common method used for accessing data either in a file or a database
table through the use of a unique value.
Select one:
a. Hashing
b. Disk fragmenting
c. Clustering
d. File compression

____ is often referred to as a "journaling" file system because it keeps track of


transactions performed when working with files and directories.
Select one:
a. EFS
b. FAT
c. MFT
d. NTFS
An area in a file that is used in case a collision occurs during the hashing algorithm is
called a(n) ____.
Select one:
a. reserved area
b. overflow area
c. random area
d. cluster

The term ____ implies reading and writing data in order, from the beginning.
Select one:
a. random access
b. sequential access
c. collision
d. hashing

____ occur when the hashing algorithm generates the same relative key for more
than one original key value.
Select one:
a. Clusters
b. Collisions
c. Compressions
d. Directories

A(n) ____ contains a group of the smallest units that can be accessed on a disk.
Select one:
a. cluster
b. NTFS
c. file system
d. FAT

The ____ keeps track of which files are using which clusters.
Select one:
a. random area
b. hash key
c. file allocation table
d. directory

____ implies that data is directly read or written anywhere on the disk.
Select one:
a. Collision
b. Hashing
c. Sequential access
d. Random access
A(n) ____ is a storage location that contains data that is treated as either binary or
text.
Select one:
a. overflow area
b. file
c. hash key
d. cluster

The ____ is used in NTFS to store data about every file and directory on the volume.
Select one:
a. overflow area
b. cluster
c. directory
d. master file table

____ are more compact and faster to access because the system does not have to
convert the data.
Select one:
a. Binary files
b. Random files
c. Sequential files
d. Hash files

____ is the process of reducing the size of a file or folder.


Select one:
a. Sequential filing
b. Disk fragmentation
c. Random filing
d. File compression

A(n) ____ is a routine of logic used for determining how hash values are created.
Select one:
a. cluster
b. MFT
c. file system
d. hashing algorithm

____ provides the ability to assign access rights to files and directories.
Select one:
a. FAT32
b. FAT12
c. NTFS
d. FAT24
____ is the encryption technology that converts the data within a file using an
encryption algorithm and key value to nonreadable information.
Select one:
a. Encrypting File System
b. FAT
c. MFT
d. NTFS

A(n) ____ is a drive or partition on a drive that is formatted with a file system.
Select one:
a. volume
b. hash key
c. hash algorithm
d. CPU

The ____ improves performance by minimizing movement of the read/write heads.


Select one:
a. file system
b. directory
c. hash key
d. disk defragmenter

A(n) ____ is a unique value used in hashing algorithms.


Select one:
a. overflow area
b. directory
c. cluster
d. hash key

Sectors are grouped together to form ____.


Select one:
a. file systems
b. MFTs
c. clusters
d. directories

A(n) ____ is a self-contained entity that consists of both data and procedures.
Select one:
a. parameter
b. method
c. constructor
d. object

The ____ is the lowest-level language that is directly understood by a computer.


Select one:
a. object oriented language
b. machine language
c. assembly language
d. constructor
A(n) ____ is a special class function/method used for creating or instantiating an
object.
Select one:
a. constructor
b. event handler
c. expression
d. function

A(n) ____ is a program that reads all statements from a program and converts them
into a computer language.
Select one:
a. control structure
b. object
c. compiler
d. event

A(n) ____ is a collection of statements or steps that solve a problem and need to be
converted into a language that the computer understands in order to perform one or
more tasks.
Select one:
a. program
b. algorithm
c. identifier
d. parameter

A(n) ____ reads assembly language code and converts it into machine language.
Select one:
a. identifier
b. control structure
c. assembler
d. event handler

The storage requirement for the int data type in Java is ____.
Select one:
a. 4 bytes
b. 8 bytes
c. 2 bytes
d. 6 bytes

A(n) ____ is a template or mold used for defining new object types along with their
properties and behavior.
Select one:
a. class
b. event
c. method
d. compiler
A(n) ____ is a programming language that resembles more what a computer can
understand rather than a human
Select one:
a. high-level language
b. event handler
c. postcondition loop
d. low-level language

A(n) ____ resides between the lowest-level language and a higher-level language; it
assigns letter codes to each machine language instruction.
Select one:
a. constructor
b. class
c. assembly language
d. machine language

A(n) ____ is used to identify a certain location and value in the computer memory.
Select one:
a. control structure
b. variable
c. constructor
d. event

A(n) ____ is a statement that associates an identifier with a variable.


Select one:
a. variable
b. endless loop
c. declaration
d. attribute

A(n) ____ is an action or occurrence that is recognized by a class.


Select one:
a. event
b. identifier
c. scope
d. variable

The term ____ is used to describe the work performed by an object.


Select one:
a. event
b. method
c. class
d. property
A(n) ____ is a program included with an executable application that acts as the
translator between the program and the computer by converting program statements
one by one into a language the computer understands.
Select one:
a. interpreter
b. constructor
c. endless loop
d. IDE

Which of the following terms describes a readable description of an algorithm written


in human language?
Select one:
a. Encapsulation
b. Variable initialization
c. Pseudocode
d. Concatenation

The process of combining or joining strings into one value is known as ____.
Select one:
a. instantiation
b. concatenation
c. nesting
d. inheritance

____ is the process of providing more class functionality by creating more specific
classes based on generic classes.
Select one:
a. Variable initialization
b. Inheritance
c. Polymorphism
d. Encapsulation

A(n) ____ is a logically ordered set of statements used to solve a problem.


Select one:
a. variable
b. identifier
c. algorithm
d. parameter

A(n) ____ is a programming language that is more human-friendly or more natural


for humans to read.
Select one:
a. interpreter
b. high-level language
c. assembly language
d. machine language
____ is the process of creating an object based upon a class.
Select one:
a. Variable initialization
b. Concatenation
c. Inheritance
d. Instantiation

____ is a style of programming that involves representing items, things, and people
as objects rather than basing the logic around actions.
Select one:
a. Object-oriented programming
b. Variable initialization
c. Assembly programming
d. Polymorphism

Which of the following terms describes a software development interface that


incorporates all of the necessary tools needed to write, compile, and distribute
programs?
Select one:
a. Object oriented programming
b. Hungarian notation
c. Variable initialization
d. Integrated development environment

The term ____ refers to the spelling and grammar used within a programming
language.
Select one:
a. interpreter
b. event
c. declaration
d. syntax

Assigning a value to a variable at declaration is called ____.


Select one:
a. variable initialization
b. startup
c. shortcut notation
d. concatenation

Testing software to ensure that it meets the software specifications is called ____.
Select one:
a. scope creep
b. software validation
c. rapid prototype
d. incremental development
____ occurs when new changes are continually added to a project thus changing the
proposed completion date so that the project is never completed, but is instead in
constant improvement mode.
Select one:
a. Testing
b. SDLC
c. Scope creep
d. Prototyping

The UML ____ diagram shows how one class communicates with another by
sending messages back and forth.
Select one:
a. collaboration
b. class
c. state
d. sequence

____ describe a system's behavior from a user's standpoint.


Select one:
a. Use cases
b. States
c. Objects
d. Classes

With ____ the application is developed and released in a series of software releases.
Select one:
a. rapid prototyping
b. waterfall prototyping
c. incremental development
d. build and fix prototyping

With ____ tools are available that allow end users to work with prototypes of the
screens and other interfaces.
Select one:
a. incremental development
b. build and fix
c. rapid prototyping
d. waterfall

A(n) ____ is a combination of symbols and text that provide a visual description of a
process.
Select one:
a. component
b. flowchart
c. class
d. object
____ is the process of producing software applications.
Select one:
a. Database administration
b. UML
c. SDLC
d. Software engineering

In the ____ model of software development, the developer writes a program and
continues to modify it until the system is functional.
Select one:
a. incremental
b. build and fix
c. rapid prototype
d. waterfall

____ is a software modeling process that enables system developers to create a


blueprint showing the overall functionality of the program being engineered and
provides a way for the client and the developer to communicate.
Select one:
a. UML
b. Scope creep
c. Prototyping
d. SDLC

____ determines whether the project is worth doing, and specifying the advantages
and disadvantages of this application.
Select one:
a. Scope creep
b. Project feasibility
c. Software specification
d. Project collaboration

A(n) ____ diagram shows the events that occur within a use case or within an
object's behavior.
Select one:
a. use case
b. collaboration
c. class
d. activity

____ determine the functions of the software and any constraints or requirements.
Select one:
a. UMLs
b. Use cases
c. Software specifications
d. Data dictionaries
A(n) ____ is a document describing the type of data being utilized within the
program, showing the table definitions, indexes, and other data relationships.
Select one:
a. design document
b. use case
c. data dictionary
d. flow chart

The UML ____ diagram shows how the different object classes relate to each other.
Select one:
a. use case
b. activity
c. class
d. sequence

A(n) ____ is a standard or typical example that gives the end user a good idea of
what they will see when their application is completed.
Select one:
a. prototype
b. design document
c. flowchart
d. data dictionary

The ____ describes the life of the application, including all of the stages involved in
the development, testing, installation, and maintenance of a program.
Select one:
a. SDLC
b. UML
c. DBA
d. SLC

The ____ is the leader of the team and is responsible for choosing the right players
for the right positions.
Select one:
a. database administrator
b. programmer
c. client
d. project manager

A(n) ____ is someone or something that needs the program to perform a function or
meet a need, and who determines the required functionality of the program.
Select one:
a. project manager
b. database administrator
c. tester
d. end user
The ____ diagram shows how system elements work together to accomplish the
system's objectives.
Select one:
a. component
b. deployment
c. collaboration
d. activity

Modifying or changing the software to meet changing customer needs is called ____.
Select one:
a. incremental development
b. software modification
c. software evolution
d. rapid prototyping

The ____ is created by reviewing the screens and reports the end user would like
included in the application and determining which fields are essential to the
application.
Select one:
a. class diagram
b. sequence diagram
c. data dictionary
d. use case

In the ____ model of software development, the fundamental processes involved in


creating the program are represented as phases. The output from each phase is
used as the input to the next phase.
Select one:
a. build and fix
b. spiral
c. waterfall
d. rapid prototyping

Software engineers and end users can both use the ____ to achieve a clearer
understanding of the data available for use in reports, screens, file transfers, and
other data operations.
Select one:
a. use case
b. class diagram
c. data dictionary
d. sequence diagram

The ____ is the interface between the testers, developers, and end users during the
creation and early release cycles of the product.
Select one:
a. programmer
b. project manager
c. customer relations representative
d. database administrator
Transforming original data into coded data so that only authorized parties can
interpret it is known as ____.
Select one:
a. authentication
b. encryption
c. packet filtering
d. piracy

A(n) ____ is a software program that can roam the Internet autonomously.
Select one:
a. honey pot
b. cookie
c. bot
d. digital certificate

A(n) ____ is an uninvited guest program on your computer with the potential to
damage files and the operating system.
Select one:
a. sniffer
b. DMZ
c. proxy firewall
d. virus

A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
developed by others.
Select one:
a. cracker
b. script kiddie
c. Trojan horse
d. reverse engineer

____ is a catchall phrase for programs that sit on your computer, with or without your
knowledge, observing your computer activities.
Select one:
a. Spyware
b. Cookie
c. Social engineering
d. Encryption

A(n) ____ is a cracker motivated by the challenge of breaking into a system.


Select one:
a. directed hacker
b. script kiddie
c. undirected hacker
d. Trojan horse
____ are shortcuts into programs created by system designers to facilitate system
maintenance but used and abused by crackers.
Select one:
a. Checksums
b. Bots
c. Backdoors
d. Heuristics

A(n) ____ firewall inspects each packet and moves it along an established link to its
destination.
Select one:
a. proxy
b. digital
c. packet-filtering
d. biometric

____ attacks seek to create a false impression that an event did not occur when it
did, or did occur when it did not.
Select one:
a. DMZ
b. Repudiation
c. Modification
d. DoS

The term ____ is used to describe the process of subverting the phone system in
order to get free service.
Select one:
a. biometrics
b. callback
c. honey pot
d. phreaking

A(n) ____ is generally a cracker motivated by greed and/or politics.


Select one:
a. script kiddies
b. undirected hacker
c. Trojan horse
d. directed hacker

____ are the moral principles for judging right or wrong behavior held by an
individual or group.
Select one:
a. Ergonomics
b. Ethics
c. Digital certificates
d. Laws
The term ____ is used to describe biological identification, such as fingerprints, voice
dynamics, or retinal scans.
Select one:
a. biometrics
b. ergonomics
c. hacktivism
d. cookie

A(n) ____ is an unwelcome system intruder with malicious intent.


Select one:
a. honey pot
b. cracker
c. spammer
d. software engineer

A(n) ____ is characterized by three things: targets that might be attacked, agents or
attackers, and events.
Select one:
a. threat
b. risk
c. callback
d. copyright

A(n) ____ occurs when a program tries to place more information into a memory
location than it can handle.
Select one:
a. modification attack
b. buffer overflow
c. access attack
d. virus attack

The term ____ is used to describe a type of bot that can roam a network looking for
vulnerable systems to replicate itself onto those systems.
Select one:
a. proxy firewall
b. Trojan horse
c. reverse engineer
d. worm

Cracking into a system as a political act is known as ____.


Select one:
a. repudiation
b. phreaking
c. hacktivism
d. social engineering
____ is a private network connection that "tunnels" through a larger, public network
and is restricted to authorized users.
Select one:
a. DMZ
b. VPN
c. AUP
d. Proxy firewall

A(n) ____ firewall establishes a new link between each packet of information and its
destination.
Select one:
a. biometric
b. digital
c. proxy
d. packet-filtering

A(n) ____ is a program that poses as an innocent program; some action or the
passage of time triggers it to do its dirty work.
Select one:
a. worm
b. Trojan horse
c. firewall
d. virus

An anonymous document that justifies cracking into a systems as an ethical exercise


is called ____.
Select one:
a. spyware
b. the Hacker's Manifesto
c. the cracker bible
d. Phreaker's Way

A(n) ____ is a software program that allows the user to listen in on network traffic.
Select one:
a. Trojan horse
b. sniffer
c. worm
d. honey pot

____ is the illegal copying of software .


Select one:
a. Software piracy
b. Biometrics
c. Social engineering
d. Dumpster diving
Code designed to breach your system security and threaten your digital information
is known as ____.
Select one:
a. malicious code
b. digital certificates
c. honey pots
d. patents

____ processing involves computer applications that can recognize and interact with
natural language text.
Select one:
a. High-level language
b. Assembly language
c. Natural language
d. Machine language

____ is the study of matter and radiation at the atomic level.


Select one:
a. Robotics
b. Pattern recognition
c. Fuzzy logic
d. Quantum mechanics

The science of ____ is primarily concerned with the mechanics and electronics that
are used to carry out the results of the other areas of artificial intelligence.
Select one:
a. fuzzy logic
b. pattern recognition
c. robotics
d. natural language processing

A(n) ____ is a computer program that simulates the judgement and behavior of a
human or an organization that has expert knowledge and experience in a particular
field.
Select one:
a. flash memory
b. neural network
c. USB drive
d. expert system

Effort is ongoing to make ____ available on cell phones.


Select one:
a. streaming video
b. streaming audio
c. HDTV
d. VCRs
A(n) ____ was conceived to reveal whether a machine had the equivalent of human
intelligence.
Select one:
a. Turing Test
b. system test
c. paradigm test
d. polymer test

It is thought that each neuron in the brain may have as many as connections to
adjacent neurons.
Select one:
a. 10,000
b. 100
c. 10
d. 1,000,000

Which of the following terms describes flash memory in a small, durable portable
case that can be plugged into a USB port of a computer and used in the same
manner as a disk drive?
Select one:
a. USB drive
b. USB disk
c. USB port
d. USB cache

____ is the branch of engineering that deals with things smaller that 100 nanometers
and especially the manipulation of individual molecules or atoms.
Select one:
a. Quantum mechanics
b. Holographic storage
c. Nanotechnology
d. Fuzzy logic

The architecture of a neural network consists of a series of ____.


Select one:
a. columns
b. modules
c. rows
d. layers

____ are a parallel interconnection of simple processing units based on the


architecture of human and animal brains.
Select one:
a. Neural networks
b. Turing tests
c. DVRs
d. USB drives
____ is an alliance of educators, students, researchers formed to create new
computing paradigms and products enabling people to interact with computers in a
more natural and useful way.
Select one:
a. AI
b. Project Oxygen
c. Project RAM
d. Project Turing

In order for a computer to emulate human behavior and reasoning, it needs to have
the ability to ____.
Select one:
a. learn
b. hear
c. talk
d. walk

A specialized computer designed to record and play back video content from cable
and satellite sources is called a(n) ____.
Select one:
a. robot
b. digital video recorder
c. quantum computer
d. expert system

Which of the following terms describes memory that uses the polarization of
microscopic magnetic layers to store ones and zeros that remain after the power
source is removed?
Select one:
a. ROM
b. DRAM
c. SRAM
d. MRAM
d
A(n) ____ is a theoretical framework, or a way of doing things.
Select one:
a. expert system
b. MRAM
c. polymer
d. paradigm

____ is a superset of conventional logic that has been extended to handle the
concept of partial truth.
Select one:
a. Speech recognition
b. Robotics
c. Fuzzy logic
d. Neural networks
____ are well suited for applications such as visual speech recognition applications.
Select one:
a. Turing tests
b. DVRs
c. Quantum computers
d. Neural networks

The concept of each person interacting with many, sometimes invisible computers
has been named "____" by computer scientist Mark Weiser.
Select one:
a. massive parallelism
b. 1984
c. ubiquitous computing
d. nanotechnology

____ is a method of splitting a laser beam and using a device called a spatial light
modulator to store full pages of information in layers on a crystal material.
Select one:
a. Speech recognition
b. Fuzzy logic
c. Holographic storage
d. Pattern recognition

____ is the science and engineering of making intelligent machines.


Select one:
a. Nanotechnology
b. Artificial intelligence
c. Quantum mechanics
d. Magnetic storage

____ functions as erasable, rewritable ROM memory.


Select one:
a. Machine learning
b. Speech recognition
c. Natural language processing
d. Flash memory

____ instructions are processed sequentially by fetching an instruction from memory,


and then executing that instruction.
Select one:
a. DRAM
b. USB
c. MRAM
d. Binary
At present, flash memories come in sizes up to ____.
Select one:
a. 100 MB
b. 2 GB
c. 4 TB
d. 1 MB

Telephone support and hot lines, such as a poison control center, can make use of
____.
Select one:
a. SDRAM
b. MRAM
c. expert systems
d. ROM

You might also like