You are on page 1of 8

1.

The______deals with active objects instead of passive objects


A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D.Object-oriented paradigm
2.The format of an IPv4 address is referred to as___
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation
3.A register in a CPU can hold___
A. Only data
B. Only instructions
C. Only program counter values
D.Data, instruction, or program counter values
4.The___is a protocol that is used to define how the client-server programs can be
written pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
5.A program becomes a___from the moment it is selected for execution until it has
finished
becomes a program again.
A. Program
B. Job
C. Process
D.Task
6.In___more than one program is in memory at the same time and they are executed
CPU switching rapidly between the programs
A. Monoprogramming
B. Multiprogramming
C. Microprogramming
D.Operating system
7.A billionth of a second is defined as a:
A. Millisecond
B. Microsecond
C. Nanosecond
D. Picoseconds
E.None of the others
8.Which is another name for functional language?
A. Machine
B. Application language
C. Low-level language
D. High-level language
E.None of the others
9.The role of the physical layer is to transfer the bits received from the data-link layer
and ___for transmission.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
10.There are several methods for handling address collisions and each of them__of
the
A. Independent
B. Dependent
C. Based on
D.Related
11.____is an ordered set of unambiguous steps that produces a result and terminates
in a finite time.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
12.In a three-level DBMS architecture, the layer that interacts directly with the
hardware is the____level
A. External
B. Conceptual
C. Internal
D.Physical
13.Which of the following is taking the one's complement of of the integer 00110110?
A. 11001100
B. 11001111
C. 11001001
D. 11100110
14.A____uses the principle of logical reasoning to answer queries. It is based on
formal logic defined by Greek mathematicians and later developed into firstorder
predicate calculus
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
15.In the data link layer, a Bluetooth LAN is a (an)___network
A. Wired WANs
B. Ad hoc
C. Dial-up service
D.Extended Service Set
16.____is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
17.The ability of a computer system to remain operational despite various failures
is___
A. Relation
B. Schema
C. Resilience
D. Versatility
E. None of the others
18.Any device that performs signal conversion is__
A. Modulator
B. Modem
C. Keyboard
D. Plotter
E. None of the others
19.Defining the users, requirements, and methods is part of the__phase.
A. Analysis
B. Design
C. Implementation
D. Testing
20.In a ____the project team needs to choose a language or a set of languages from
among the procedural anguages
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
21.____can be threatened by security attacks.
A. Confidentiality, cryptography, nonrepudiation
B. Confidentiality, encryption, decryption
C. Confidentiality, integrity, availability
D. Confidentiality, denial of service, masquerading
22.___protocol (s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
23.Static RAM (SRAM) technology uses___The gates hold their state 0 or 1.
A. Ultraviolet light
B. Electronic impulses
C. Capacitors
D. Flip-flop gates
24.To search for elements, we can use__on sorted arrays that can help to decrease
time complexity
A. Sequential search
B. Insertion sort
C. Selection sort
D. Binary search
25.C language is a(n)___language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
26.___a unit that can add two inputs.
A. An ALU
B. A register
C. A control unit
D. A tape drive
27.The number of bits per sample is sometimes referred to as the___
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
28.The maximum value of an octal integer with K=2 digits is Nmax =__
A. 63
B. 64
C. 6
D. 66
E. None of the others
29.A company's product or service is identified as a
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
30.Which of the following representations is erroneous?
A. (10211)2
B. (342)8
C. (EEE)16
D. 145
31.What is method in black-box testing which tests are designed to include
representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing.
32.___is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
33.A system program which helps the execution of user programs is known as:
A. System software
B. Application program
C. Batch operating system
D. Utilities
E. None of the others
34.In the hierarchical database model, data is organized as an inverted___
A. Graph
B. Tree
C. Array
D. Record
35.___can be measured by such metrics as mean time between failures number
of bugs per thousand lines of
code and number of user requests for change.
A. Accuracy
B. Security
C. Efficiency
D. Correctability
36.In___sort, the smallest item moves to the beginning of the unsorted list.
There is no one-to-one swapping.
A. Selection
B. Bubble
C. Insertion
D. Every
37.___is an attack that reduce the capability of a computer system to function
correctly or bring the system down altogether by exhausting its resources.
A. DoS
B. Trojan horses
C. Worms
D. Viruses
38.Why OS is responsible for the efficient use of input/output devices?
A. Because need to maintains a queue for each input/output device
B. Because these devices are slower in speed compared with the CPU and
memory
C. It may use FIFO for one device
D. The manager also needs to know when a device has finished serving one
process
39.Use a simple right shift operation on the bit pattern 1001 1000.
A. 1001 1001
B. 1001 1000
C. 0100 1101
D. 0100 1100
40.The___ operation that takes two relations and combines them based on
common attributes is the
operation.
A. Join
B. Project
C. Union
D. Intersection.

41.In a positional number system with base b, we can always find the number
of digits of an integer. So how many digits can we find in the decimal number
234 in decimal?
A. 1
B. 2
C. 3
D. 4
42.Which component is not an operating system component?
A. File access management program
B. Device driver program
C. Program scheduler for process
D. Free memory management program
43.__is the process by which a given set of relations are transformed to a new
set of relations with a more
solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
44.Each row in a relation is called__
A. An attribute
B. A tuple
C. A union
D. An attitude
45.If the ASCII code for E is 1000101, then the ASCII code for e
is___consulting the ASCII table.
A. 1000110
B. 1000111
C. 0000110
D. 1100101
46.The push operation__of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
47.We use the___ search for an ordered list.
A. Sequential
B. Binary
C. Bubble
D. Insertion
48.An__ is a sequence of operands and operators that reduces to a single value
A. Expression
B. Operator
C. Variables
D. Input/output
49. ___is a series of randomized letters and numbers which humans cannot
make any sense of.
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
50.A___is a collection of related elements possibly of different types having a
single name
A. Array
B. Record
C. Linked list
D. Tree
51.In___cryptography, everyone has access to everyone's public key.
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
52.In___the program can be divided into equally sized sections called pages,
but the pages need not be in memory at the same time for execution.
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
53.In a__the relationship between a character in the plaintext to a character in
the ciphertext is one-to-many.
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
54.Use a circular right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 0011 0001
C. 1001 1001
D. 1001 1000
55.Which type of computers use the 8 bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Supercomputers
E. None of the others
56.A hashed file uses a__ to accomplish this mapping.
A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function
57.Who is considered the 'father' of the minicomputer and one of the founder
fathers of the modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
E. None of the others
58.In___edges are ordered pairs of vertices. If x and y are two vertices and an
edge e = (x, y), x is called the starting point and y is called the endpoint of the
edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
59.The attack that reduces the capability of a computer is called a__attack
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
60.How can we set name of nodes in a linked list?
A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer

You might also like