0% found this document useful (0 votes)
58 views14 pages

Nhom 1

The document contains 60 multiple choice questions covering various topics related to computers and information technology. The questions test knowledge across different domains including computer hardware, operating systems, algorithms, programming languages, databases, networking, cybersecurity and more.

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views14 pages

Nhom 1

The document contains 60 multiple choice questions covering various topics related to computers and information technology. The questions test knowledge across different domains including computer hardware, operating systems, algorithms, programming languages, databases, networking, cybersecurity and more.

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1/ A modern electronic computer is a machine that is meant for

A. Doing quick mathematical calculations


B. Input storage, manipulation of outputting of data
C. Electronic data processing
D. Performing repetitive tasks accurately
E. None of the others

2/ ______ means concealing the message by covering it with something else.


A. Cryptography
B. Steganography
C. Compressing
D. Authentication

3/ In the attacks threaten integrity with ___ attack the attacker modifies the
information to…
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis

4/ The items are divided into two lists (sorted and unsorted) ____ sort
A. Only in a selection
B. Only in a bubble
C. Only in an insertion
D. In selection, bubble, or insertion

5/____ is a popular object-oriented language.


A. FORTRAN
B. COBOL
C. Java
D. LISP
6/ Each row in a relation is called ____
A. An attribute
B. A tuple
C. A union
D. An attitude

7/ In a _____ the project team needs to choose a language or a set of languages from
among …
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

8/ The ___ of ethics says an act is ethical if a majority of people in society agree with
it.
A. Moral rules
B. Social contract
C. Ultilization
D. Nonmaleficence

9/ What type of OS evolution that need for more speed and efficiency led to the
design with multiple CPUs on the same machine?
A. Personal systems
B. Distributed systems
C. Parallel systems
D. Real-time systems

10/ ____ explicitly defines connection establishment, data transfer, connection


teardown phases to provide a connection-oriented service AND reliable protocol
A. TCP
B. UDP
C. IP
D. HTTP
11/ What is statement that stores the value in the variable, which has already been
created in the declaration section. We use the symbol <- in our algorithm to define it?
A. Compound statement
B. Assignment statement
C. Control statement
D. None of above

12/ Arithmetic right shift is used to ___ an integer by two


A. Addition
B. Subtraction
C. Divide
D. Multiply

13/ A ___ is a collection of related elements possibly of different types having a single
name
A. Array
B. Record
C. Linked list
D. Tree

14/ Inside the ADT are two different parts of the model that are ___ and ___
A. Data structure and operations
B. Application program and public operations
C. Application program and private operations
D. Data struture and application program

15/ A device that prints one character at a time is known as


A. Laser printer
B. Line printer
C. Character printer
D. Dot-Matrix printer
E. None of the others
16/ A register in a CPU can hold ____
A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values

17/ In the ____we can think of a program as an active agent that manipulates passive
objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

18/ Conversion of binary number 1010101000010111 to hexadecimal number is


A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

19/ The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database asministrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database adminitrators

20/ In the data link layer, Standard Ethernet is ____


A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
21. Testing a software system can involve
testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box

22. A memory that does not change its contents without external causes is known as
A. Dynamic memory
B. Static memory
C. RAM
D. EEPROM
E. None of the others

23. The combination of sign and mantissa of a real number in IEEE standard floating
point format is stored as an integer in the representation.
A. Unsigned
B. Sign-and-magnitude
C. Two's complement
D. One's complement

24. The software used to convert source program instructions to object instruction is
known as
A. Compiler
B. Assembler
C. Interpreter
D. Language processor
E. None of the others
25. In peripheral device management, what is the principle of hierarchical work on OS
of third-generation computers?
A. Processor-Peripheral device-Control device
B. Processor-Control device-Peripheral device
C. Control device-Peripheral device-Processor
D. None of the answers are correct

26. In cryptography, everyone has access to everyone's public key.


A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key

27. In the hierarchical database model, data is organized as an inverted


A. Graph
B. Tree
C. Array
D. Record

28. The manager is responsible for archiving and backup.


A. Memory
B. Process
C. Device
D. File

29. What is quality referring to the ability to move software from one hardware
platform to another
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability

30. Which is a unit representing the no bits of discrete.


A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others

31. What is the name of the computer which was first used for programming and
playing of music?
A. ELLIAC
B. ENIAC
C. UNIVAC
D. All of the others
E. None of the others

32. An index register that is automatically incremented or decremented with each use
is
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others

33. The construct uses a set of actions one after another.


A. Sequence
B. Decision
C. Repetition
D. Flow

34. The base of the binary number system is


A. 2
B. 8
C. 10
D. 16

35. The most important advantage of a video disk is


A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others

36. ......is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion

37. In the graphic method of representing an image in a computer, the image is


decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary

38. Main memory is the second major subsystem in a computer. It consists of a


collection of storage locations, each with a unique identifier, called an
A. Values
B. Address
C. Bit
D. Words

39. A process in the ready state goes to the running state when
A. It enters memory
B. It requests I/O
C. It gets access to the CPU
D. It finishes running

40. ......is a pictorial representation of an algorithm.


A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm

41/In___________paradigm, the service provider is an application program, it runs


continuously, waiting for another application program, then to make a connection
through the Internet and ask for service
A. P2P
B. Tranditional
C. Client sever
D. Model

42/In a stream cipher encryption and decryption are done one symbol. We have a
plaintext stream a ciphertext stream and a______
A. Key block
B. Single key
C. Key stream
D. Auto key

43/In monoprogramming, most of the memory capacity IS dedicated to a_____ if we


consider the data to be_____________processed by a program as part of the
program.
A. Single program
B. Mutti program
C. Address location
D. Set of instructional

44/ How can we set name of nodes in a linked Iist?


A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer

45/ There are several methods for handling address collisions and each of
them_______of the hashing algorithm
A. Independent
B. Dependent
C. Based on
D. Related
46/Defining the users, requirements, and methods is part of______ the phase-
A. Analysis
B. Design
C. Implementation
D. Testing

47/The___________in the TCP/IP protocol suite is responsible for the host-to-host


delivery of messages
A. physical
B. Data-link
C. Neuork
D. Transport

48/If personal information about each employee in a company is stored in a file we


can use_________ access to retrieve each record at the end of the month to print the
paychecks
A. Hashed file
B. Sequential file
C. EOF
D. Index file

49/The attack that reduces the capability of a computer is called a__________attack.


A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

50/A company's product or service is identified as a____


A. Trade mark
B. Trade secret
C. Patent
D. Copyright

51/The operation that takes Wo relations and combines them based on common
attributes is the operation_______
A. Join
B. Project
C. Union
D. Intersection

52/Where does a computer add and compare data?


A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the otherside

53/An______of a binary search tree (BST) creates a list that is sorted in ascending
order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal

54/An indexed file conscsts of___


A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55/Each node in a graph can have ___parents
A. Only one
B. No node
C. One or more
D. At most two node

56/The enqueue operation____an item at the_______of the queue


A. Delete front
B. Delete end
C. Inserts front
D. Insert rear

57/A mechanism for arranging controlled access to a shared resource is________


A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others

58/The octal equivalent af 1100101.001010 is


A. 624.12
B. 145.12
C. 154.12
D. 14591
E. None of the otherside

59/RISC ( reduced instruction set computer)- The strategy behind RISC architecture is
to have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions

60/A data structure can be


A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list

You might also like