You are on page 1of 4

KING SAUD UNIVERSITY COMMUNITY COLLEGE Computer Science Department

Students Name:_________________ Students Number: _______________ Section Number: ___________

102 Introduction to Information Technology FINAL EXAM II-semester 2006-07 11 June 2007 Max. marks: 50

Multiple choice 1) The physical layout of a LAN is called _________________. a) topology b) switch c) link 2) ______________ medium is least susceptible to noise. a) twisted pair b) fiber optics c) microwave

Marks: 30 X 1 = 30

d) protocol

d) satellite

3) Two dissimilar networks can be connected by a _______________. a) node b) router c) gateway d) switch 4) The process of converting from analog to digital is called _________________. a) modulation b) duplex c) simplex d) demodulation 5) _____________ method is used by Ethernet network to control access to the network. a) CSMA/CD b) ISDN c) a bus d) token passing 6) Data transmission in both directions but only one way at a time is called ______________. a) full-duplex b) half-duplex c) simplex d) start/stop 7) In a _______________ network all nodes are connected to a single network cable. a) star b) ring c) bus d) switched 8) In ________________ network all computers have equal status. a) client/server b) star c) token ring d) peer-to-peer 9) A website's initial page is called _____________. a) home page b) primary page c) mother page

d) entry page

10) A message sent to anther computer over Internet is divided into _______________ a) URLs b) packets c) frames d) boxes 11) The most used top-level domain is _________________. a) .net b) .edu c) .com

d) .org

12) The first major network of computers was ________________. a) WWW b) EarthNet c) BIGnet d) ARPANET 13) _________________ is not protected by copyright. a) brand name b) music CD c) novel

d) computer program

14) __________ protects images from your website to be used by others without permission. a) copyleft b) copyright c) patent d) trademark

15) ___________ protects a business method implemented in software. a) copyleft b) copyright c) patent d) trademark 16) The SDLC consists of ___________ phases. a) three b) four c) six

d) five

17) Testing of each individual program or module is called ______________ testing. a) unit b) system c) volume d) program 18) A chart of positions and departments within an organization is a ___________. a) data flow diagram b) organization chart c) Gantt chart d) prototype 19) The preliminary investigation of a systems project is also called _____________. a) analysis b) design c) feasibility study d) evaluation 20) In the course of systems project, system design ________________. a) is fourth phase b) follows development c) precedes analysis

d) follows analysis

21) Testing the system with large quantities of real data is called _____________ testing. a) volume b) system c) parallel d) unit 22) An assembly language uses _____________. a) 0s and 1s b) mnemonic codes

c) English words

d) binary digits

23) The first high-level language to be introduced was _______________. a) COBOL b) Pascal c) FORTRAN d) BASIC 24) The lowest level of programming language is _______________ language. a) natural b) BASIC c) assembly d) machine 25) An English like language used for business applications is ________________. a) COBOL b) BASIC c) FORTRAN d) JAVA 26) The network friendly language derived from C++ is _____________. a) BASIC b) Java c) RPG d) FORTRAN 27) A fourth-generation language used for database retrieval is ____________ language. a) assembly b) high-level c) query d) machine 28) Software that translates assembly language into machine language is ______________. a) compiler b) link-loader c) translator d) assembler 29) The Java language is _______________. a) object b) problem c) machine

d) document

30) The process of detecting, locating, and correcting logic errors is called _____________. a) desk-checking b) debugging c) translating d) documenting

TRUE / FALSE: 1) FORTRAN stands for FORms TRANsfer. 2) A query language is a type of assembly language. 3) A flowchart is an example of pseudocode. 4) BASIC is especially suited for large and complex programs.

Marks: 15 X 1 = 15 ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F ) ( T / F )

5) Questionnaires are more expensive form of data gathering than interviews. 6) Synchronous transmission is also called start/stop transmission. 7) Computers consume an insignificant amount of electrical power. 8) Wintel is an example of a platform. 9) A system analyst normally performs analysis and design. 10) A decision table can help to ensure that no alternative is overlooked. 11) A thin client has no disk storage. 12) A multiplexer combines many slow-speed transmissions into a single high-speed data stream. 13) Synchronous transmission sends many characters in a single block. 14) Plug-ins increase the functionality of browsers. 15) TCP/IP is the standard Internet protocol.

( T / F ) ( T / F ) ( T / F ) ( T / F )

Fill in the blanks with the words given in the box below: Marks: 10 X = 5

patent URL

intranet SDLC

platform HTTP

compiler syntax

ergonomics trademark

1) _______________ is the protocol that uses links to move from one site to another on the Internet. 2) ______________ is a string of letters and symbols that is unique address of a web page or file on the Internet. 3) ______________ is a private Internet-like network that is internal to a company. 4) ______________ provides an inventor exclusive rights to the invention for 20 years. 5) ______________ is the use of research in designing systems, programs, or devices that are appropriate to use for their intended purpose. 6) ______________ is the name for the phases involved in developing a new project. 7) ______________ is the translator that translates high-level language into machine language. 8) ______________ is the rules of a programming language. 9) ______________ is known as the hardware and software combination of a computer. 10) _____________ is a word, name, symbol, or device used to distinguish one company and its products from another.