Professional Documents
Culture Documents
I. This test consists of 45 items. You will have I hour and 30 minutes to answer them.
Sample Item
How many selection lines does an 8 x 1 multiplexer have? Sample Answer
(A) 1
(B) 2
(C) 3
0
0 (D) 8
<t
The best answer to this item is "3", so (C) has been shaded.
6. If you want to change your answer, erase it completely before you fill in your new choice.
7. When you are told to begin, tum the page and work as quickly and as carefully as you can. If you
cannot answer an item, go on to the next one. You may return to that item later.
(A) I and V
(B) II and VI
(C) III and VII
(D) IV and VIII
9. The target value is 19. A binary search is 11. Which of the following lists will NOT be
employed. What is the second value to be obtained at any point while applying the
compared with the target value, 19? selection sort algorithm?
13. A queue is implemented using a one-dimensional array. Which of the following actions BEST
describes the dequeue operation performed using the array?
17. Which of the following outputs is a result 21. The MAIN goal of component testing is to
of using a CASE tool?
(A) expose faults in the components
(A) Cost/benefit analysis (B) demonstrate that the system meets
(B) Program definition its requirements
(C) Feasibility study (C) increase the supplier's confidence
(D) Prototype that the system meets its require-
ments
(D) test how one component interacts
18. Which of the following is LEAST helpful with others in the system
in an error message presented to a user?
;·.-i-,·:
,,•i ,'f
•~':f;
_;,;:
-9-
Insulator
I
I
Iniler
I
Insulator
conductor
conductor
(A) Coaxial
(B) Fibre optic
(C) Firewire
(D) Shielded twisted pair
34. The term 'firewire' refers to a 35. A webmaster has decided to design his
website offline and upload the various files
(A) type of cabling that allows com- and graphics to the web server remotely.
munication between computers
(B) software running on a computer Which of the following methods would be
that protects it from external BEST suited for providing the FASTEST
attacks and MOST secure way of uploading the
(C) high-speed serial bus system data?
(D) type of computer virus
(A) FTP
l (8)
(C)
(D)
GSM
HTML
UML
(A) routing
(B) addressing
(C) modulation and demodulation
(D) multiplexing and expandibility
37. Which of the following outcomes relates 39. Which of the following phrases BEST
to the use of virtual memory? describes ' paging ' ?
(A) Results in faster execution speeds (A) The division of documents into
(B) Creates an illusion that the computer smaller chunks
has more memory (B) The assignment of chunks of a
(C) Ensures that memory works faster program called frames to main
(D) Ensures that all programs are in memory called pages
memory (C) The assignment of chunks of a
progam called frames to different
38.
secondary storage media
Which IEEE standards can be employed (D) The assignment of chunks of a
when setting up a wireless LAN for
program called pages to chunks
wireless devices needing transfer rates
of memory caJled frames
GREATER than 20 mbps?
I. 802.11 a
Item 40 refers to the following diagram .
II. 802.11 b
III. 802. l l g
(A) I only
(B) II only
(C) l and II only
(D) I and III only
·y;:t'~
, .,...
. ' .:&.-, .
- l1 -
41. Which of the following determines the 44. Which of the following is true about a
amount of time a running process gets process being scheduled with a non-pre-
to use the CPU when a round-robin emptive algorithm?
scheduling algorithm is used?
(A) It is placed at the top of the ready
(A) The order of arrival of the process queue if it has a higher priority
on the ready queue than all the processes already in
(B) The priority of the process the queue.
(C) The estimated running time of the (B) Once it enters the running state, it
process is allowed to run to completion
(D) The fixed time of the operating or until it yields the processor.
system (C) Once it enters the running state, it
is given a fixed amount of time
to use the CPU after which other
42. A running process initiates an input request processes get a chance to use the
to get data from the keyboard. Which of the CPU.
following state transitions will take place (D) Once it enters the running state, it is
when the data is made available? given a variable amount ohime
to use the CPU depending on its
(A) Ready to running priority.
(B) Running to ready
(C) Blocked to ready
(D) Blocked to running 45. In a network where the running applications
generate a significant amount of traffic,
which of the following devices would NOT
Item 43 refers to the following diagram. be suitable?
Process A
(A) Router
(B) Switch
(C) Hub
(D) Bridge
Process B
(A) Deadlock
(B) Round robin
(C) Interrupt
(D) Fetch-decode-execute cycle
END OFTEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.