Professional Documents
Culture Documents
41.In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4
42.Which component is not an operating system component?
A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.__is the process by which a given set of relations are transformed to a new
set of relations with a more
solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
44.Each row in a relation is called__
A. An attribute
B. A tuple
C. A union
D. An attitude
45.If the ASCII code for E is 1000101, then the ASCII code for e
is___consulting the ASCII table.
A. 1000110
B. 1000111
C. 0000110
D. 1100101
46.The push operation__of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
47.We use the___ search for an ordered list.
A. Sequential
B. Binary
C. Bubble
D. Insertion
48.An__ is a sequence of operands and operators that reduces to a single value
A. Expression
B. Operator
C. Variables
D. Input/output
49. ___is a series of randomized letters and numbers which humans cannot
make any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
50.A___is a collection of related elements possibly of different types having a
single name
A. Array
B. Record
C. Linked list
D. Tree
51.In___cryptography, everyone has access to everyone's public key.
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52.In___the program can be divided into equally sized sections called pages,
but the pages need not be in memory at the same time for execution.
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
53.In a__the relationship between a character in the plaintext to a character in
the ciphertext is one-to-many.
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
54.Use a circular right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000
55.Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others
56.A hashed file uses a__ to accomplish this mapping.
A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function
57.Who is considered the 'father' of the minicomputer and one of the founder
fathers of the modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others
58.In___edges are ordered pairs of vertices. If x and y are two vertices and an
edge e = (x, y), x is called the starting point and y is called the endpoint of the
edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
59.The attack that reduces the capability of a computer is called a__attack
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
60.How can we set name of nodes in a linked list?
A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer