FE CSI104 - ZXCVBNM
FE CSI104 - ZXCVBNM
about:blank 1/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
3-6 An image can be represented in a computer using the either bitmap or vector graphic
method.
3-7 In the bitmap graphic method of representing an image in a computer,
each pixel is assigned a bit patterns.
3-8 In the vector graphic method of representing an image in a computer,
the image is decomposed into a combination of geometrical figures.
3-9 In the bitmap graphic method of representing an image in a computer,
re-scaling of the image creates a ragged or grainy image.
3-10 When we want to store music in a computer, the audio signal must be
sampled, quantized, and coded
3-11 A floating-point value after normalization is (1.0101) ? 2?4. What is the
value of exponent section in the Excess-127 representation? 123
3-12 Assume a new Excess system uses 17 bits to represent the exponent
section. What is the bias value in this system? 65535
3-13 Which number representation method is often used to store the exponential value of a
fractional part? Excess
3-14 In an Excess conversion, we add the bias number to the number to be converted.
3-15 When a fractional part is normalized, the computer stores the the sign, exponent, and
mantissa
3-17 The combination of sign and mantissa of a real number in IEEE
standard floating point format is stored as an integer in the sign-and-magnitude
representation.
4-1 Subtraction is an arithmetic operation.
4-2 exclusive OR, unary NOT, or binary AND is a logical bit operator.
4-3 The two's complement method of integer representation is the most common method for
storing integers in computer memory.
4-4 In two's complement addition, if there is a final carry after the left most
column addition, discard it
4-5 For an 8-bit allocation, the smallest decimal number that can be
represented in two's complement form is -128
4-6 For an 8-bit allocation, the largest decimal number that can be
represented in two's complement form is 127
about:blank 2/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 3/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 4/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 5/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 6/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Discover more
from:
Computer
Science -…
CS 141
Trường Đại học FPT
924 documents
Go to course
Workshop 01 - Lecture
notes 1
3
94% (34)
Progress-Test-3-for-
SE1502 -Attempt
10
Mathematics
100% (5)
Engineering
about:blank 7/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Exercise MAE 101
Chapter 1 LA
3
Mathematics
100% (2)
Engineering
10-3 In the system development process, writing the program is part of the implementation
phase.
10-4 In the system development process, structure charts are tools used in the design phase.
10-5 Testing a software system can involve both black-box and glass-boxtesting.
10-6 Modularization is the breaking up of a large project into smaller parts.
10-7 Coupling is a measure of how tightly two modules are bound to each other.
10-8 Coupling between modules in a software system must be minimized.
10-9 Cohesion between modules in a software system must be maximized.
11-1 A data structure can be an array, a record, or a linked list
11-2 An array that consists of just rows and columns is a one-dimensional array.
11-3 Each element in a record is called a field
11-4 All the members of a record must be related types
11-5 A linked list is an ordered collection of data in which each element contains the location
of the next element.
11-6 In a linked list, each element contains data and a link
11-7 The link is a pointer that identifies the next element in the linked list.
11-8 Given a linked list called children, the pointer variable children identifies the first
element of the linked list.
11-9 An empty linked list consists of a null head pointer
11-10 To traverse a list, you need a walking pointer.
12-1 In an abstract data type, the ADT implementation is hidden
12-2 A stack is a LIFO structure.
12-3 A (n) FIFO list is also known as a queue.
12-4 If A is the first data element input into a stack, followed by B, C, and D,
then D is the first element to be removed.
12-5 If A is the first data element input into a queue, followed by B, C, and
D, then A is the first element to be removed.
12-6 The pop operation deletes an item from the top of the stack.
12-7 The push operation inserts an item at the top of the stack.
12-8 In a binary tree, each node has at most two subtrees.
12-9 In preorder traversal of a binary tree, the root is processed first
about:blank 8/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 9/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
14-2 In a three-level DBMS architecture, the internal level determines where data is actually
stored on the storage devices.
14-3 The conceptual level of a three-level DBMS architecture defines the logical view of the
data.
14-4 The data model and the schema of a DBMS are often defined at the conceptual level.
14-5 In a three-level DBMS architecture, the external level interacts directly with the users.
14-6 Of the various database models, the relational model is the most prevalent today.
14-7 Each column in a relation is called an attribute
14-8 Each row in a relation is called a tuple
14-9 A unary operator is applied to one relation(s) and creates an output of two relation(s).
14-10 A binary operator is applied to two relation(s) and creates an output of one relation(s).
14-11 The unary insert operation always results in a relation that has exactly one more row
than the original relation.
14-12 If you want to change the value of an attribute of a tuple, you use the update operation.
14-13 The operation that takes two relations and combines them based on common attributes
is the join operation.
14-14 If you need to delete an attribute in a relation, you can use the project operation.
14-15 You want to create a relation called New that contains tuples that belong to both
relation A and relation B. For this, you can use the intersection operation.
14-16 Which of the following is a unary operator? project
14-17 Which of the following is a binary operator? difference
14-18 SQL is a declarative language used on relational databases.
15-1 Data is compressed using a dictionary with indexes to strings. This is Lempel Ziv
encoding
15-2 A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is
run-length encoding
15-4 In a lossless data compression method, the received data is an exact copy of the original
message.
15-5 In MP3, JPEG, or MPEG data compression method, the received data need not be an
exact copy of the original message.
15-3 JPEG is an example of lossy compression.
15-6 Huffman, run-length, or LZ encoding is a lossless data compression method.
15-7 In Huffman encoding, the more frequently occurring characters have shorter codes than
the less frequently occurring characters.
about:blank 10/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 11/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
about:blank 12/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Prototype A ... is a standard or typical example of how something might work, but
without all the built-in functionality. *
HTTP Which of the following protocols makes the Web possible? *
TCP Which portion of the TCP/IP protocol suite provides error detection and correction *
None of the above Which is not included as a task of software engineering? *
Algorithm Which is not a type of control structure? *
Thousands How many DNS servers does the Internet have? *
Domain What is the set of possible values for a column? *
Eliminate repeated fields First normal DB form say *
C++ Which of the following is not a valid DBMS? *
Degradation Which is not a valid software development model? *
Worm A....... is a bot that actively reproduces itself across a network *
passwords Use ...................................to protect everything Startup, e-mail, router, phone,
PDA, screen saver *
HTML Which of the following is not an Internet-related protocol? *
Virus .............. are uninvited guest programs on your computer with the potential to damage
files and the operating system *
Efficient disk use on small volumes Which is not an advantage of using NTFS? *
Primary key What uniquely identifies a row in a table? *
1 How many IP addresses are presented to the Internet when NAT is used? *
65,536 5. How many possible ports are allowed in TCP? *
80 What is the standard port number for HTTP? *
Array A(n) __________ is a data structure consisting of contiguous memory locations *
Flowchart A ... is used as a visual model for describing a program's logical steps *
DHCP Which Internet protocol is used to assign IP addresses dynamically? *
ORDER BY Which of the following SQL SELECT options is used to organize the data
being returned? *
Flash With _________ the microchip is organized so that a section of memory cells are
erased in a single action. *
None of the above Which should not be included in the design document? *
Assembly Which is not an example of a high-level programming language? *
A blueprint that shows an application's functionality A design document is used as: *
about:blank 13/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Compiler Which of the following converts source code into a computer language and
results in an executable file? *
Add the data Which is not a step of the database design process? *
minimize drive head movement? Disk Defragmenter utility is used to *
Variable What is a name used to identify a specific location and value in memory? *
Data dictionary The document responsible for describing the type of data stored in the
database is called the *
Troyjan is a program that poses as an innocent program *
SMTP Which of the following is an example of a high-level protocol? *
None of the above Which is not a type of programming language? *
about:blank 14/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
More from:
Computer
Science -…
CS 141
Trường Đại học FPT
924 documents
Go to course
Workshop 01 - Lecture
notes 1
3
Computer
94% (34)
Science -…
Workshop 01 - Lecture
notes 1
3
about:blank 15/16
13:32 24/03/2024 FE CSI104 - zxcvbnm
Computer 94% (34)
Science -…
Progress-Test-3-for-
SE1502 -Attempt
10
Mathematics
100% (5)
Engineering
about:blank 16/16