1/ A modern electronic computer is a machine that is meant for
A. Doing quick mathematical calculations
B. Input storage, manipulation of outputting of data
C. Electronic data processing
D. Performing repetitive tasks accurately
E. None of the others
2/ ______ means concealing the message by covering it with something else.
A. Cryptography
B. Steganography
C. Compressing
D. Authentication
3/ In the attacks threaten integrity with ___ attack the attacker modifies the
information to…
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis
4/ The items are divided into two lists (sorted and unsorted) ____ sort
A. Only in a selection
B. Only in a bubble
C. Only in an insertion
D. In selection, bubble, or insertion
5/____ is a popular object-oriented language.
A. FORTRAN
B. COBOL
C. Java
D. LISP
6/ Each row in a relation is called ____
A. An attribute
B. A tuple
C. A union
D. An attitude
7/ In a _____ the project team needs to choose a language or a set of languages from
among …
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
8/ The ___ of ethics says an act is ethical if a majority of people in society agree with
it.
A. Moral rules
B. Social contract
C. Ultilization
D. Nonmaleficence
9/ What type of OS evolution that need for more speed and efficiency led to the
design with multiple CPUs on the same machine?
A. Personal systems
B. Distributed systems
C. Parallel systems
D. Real-time systems
10/ ____ explicitly defines connection establishment, data transfer, connection
teardown phases to provide a connection-oriented service AND reliable protocol
A. TCP
B. UDP
C. IP
D. HTTP
11/ What is statement that stores the value in the variable, which has already been
created in the declaration section. We use the symbol <- in our algorithm to define it?
A. Compound statement
B. Assignment statement
C. Control statement
D. None of above
12/ Arithmetic right shift is used to ___ an integer by two
A. Addition
B. Subtraction
C. Divide
D. Multiply
13/ A ___ is a collection of related elements possibly of different types having a single
name
A. Array
B. Record
C. Linked list
D. Tree
14/ Inside the ADT are two different parts of the model that are ___ and ___
A. Data structure and operations
B. Application program and public operations
C. Application program and private operations
D. Data struture and application program
15/ A device that prints one character at a time is known as
A. Laser printer
B. Line printer
C. Character printer
D. Dot-Matrix printer
E. None of the others
16/ A register in a CPU can hold ____
A. Only data
B. Only instructions
C. Only program counter values
D. Data, instruction, or program counter values
17/ In the ____we can think of a program as an active agent that manipulates passive
objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
18/ Conversion of binary number 1010101000010111 to hexadecimal number is
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
19/ The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database asministrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database adminitrators
20/ In the data link layer, Standard Ethernet is ____
A. 10 Mbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
21. Testing a software system can involve
testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box
22. A memory that does not change its contents without external causes is known as
A. Dynamic memory
B. Static memory
C. RAM
D. EEPROM
E. None of the others
23. The combination of sign and mantissa of a real number in IEEE standard floating
point format is stored as an integer in the representation.
A. Unsigned
B. Sign-and-magnitude
C. Two's complement
D. One's complement
24. The software used to convert source program instructions to object instruction is
known as
A. Compiler
B. Assembler
C. Interpreter
D. Language processor
E. None of the others
25. In peripheral device management, what is the principle of hierarchical work on OS
of third-generation computers?
A. Processor-Peripheral device-Control device
B. Processor-Control device-Peripheral device
C. Control device-Peripheral device-Processor
D. None of the answers are correct
26. In cryptography, everyone has access to everyone's public key.
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
27. In the hierarchical database model, data is organized as an inverted
A. Graph
B. Tree
C. Array
D. Record
28. The manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
29. What is quality referring to the ability to move software from one hardware
platform to another
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability
30. Which is a unit representing the no bits of discrete.
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others
31. What is the name of the computer which was first used for programming and
playing of music?
A. ELLIAC
B. ENIAC
C. UNIVAC
D. All of the others
E. None of the others
32. An index register that is automatically incremented or decremented with each use
is
A. Auto index
B. Asynchronous
C. Assembler
D. Compiler
E. None of the others
33. The construct uses a set of actions one after another.
A. Sequence
B. Decision
C. Repetition
D. Flow
34. The base of the binary number system is
A. 2
B. 8
C. 10
D. 16
35. The most important advantage of a video disk is
A. Compactness
B. Potential capacity
C. Durability
D. Cost effectiveness
E. None of the others
36. ......is a measure of how tightly two modules are bound to each other.
A. Modularity
B. Coupling
C. Interoperability
D. Cohesion
37. In the graphic method of representing an image in a computer, the image is
decomposed into a combination of geometrical figures.
A. Bitmap
B. Vector
C. Quantized
D. Binary
38. Main memory is the second major subsystem in a computer. It consists of a
collection of storage locations, each with a unique identifier, called an
A. Values
B. Address
C. Bit
D. Words
39. A process in the ready state goes to the running state when
A. It enters memory
B. It requests I/O
C. It gets access to the CPU
D. It finishes running
40. ......is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
41/In___________paradigm, the service provider is an application program, it runs
continuously, waiting for another application program, then to make a connection
through the Internet and ask for service
A. P2P
B. Tranditional
C. Client sever
D. Model
42/In a stream cipher encryption and decryption are done one symbol. We have a
plaintext stream a ciphertext stream and a______
A. Key block
B. Single key
C. Key stream
D. Auto key
43/In monoprogramming, most of the memory capacity IS dedicated to a_____ if we
consider the data to be_____________processed by a program as part of the
program.
A. Single program
B. Mutti program
C. Address location
D. Set of instructional
44/ How can we set name of nodes in a linked Iist?
A. Depend on user
B. Name of the pointer
C. Implicit ones
D. Name of the head pointer
45/ There are several methods for handling address collisions and each of
them_______of the hashing algorithm
A. Independent
B. Dependent
C. Based on
D. Related
46/Defining the users, requirements, and methods is part of______ the phase-
A. Analysis
B. Design
C. Implementation
D. Testing
47/The___________in the TCP/IP protocol suite is responsible for the host-to-host
delivery of messages
A. physical
B. Data-link
C. Neuork
D. Transport
48/If personal information about each employee in a company is stored in a file we
can use_________ access to retrieve each record at the end of the month to print the
paychecks
A. Hashed file
B. Sequential file
C. EOF
D. Index file
49/The attack that reduces the capability of a computer is called a__________attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
50/A company's product or service is identified as a____
A. Trade mark
B. Trade secret
C. Patent
D. Copyright
51/The operation that takes Wo relations and combines them based on common
attributes is the operation_______
A. Join
B. Project
C. Union
D. Intersection
52/Where does a computer add and compare data?
A. Hard disk
B. Floppy disk
C. CPU chip
D. Memory chip
E. None of the otherside
53/An______of a binary search tree (BST) creates a list that is sorted in ascending
order.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
54/An indexed file conscsts of___
A. Only a sequential data file
B. Only an index
C. Only a random data file
D. An index and random data file
55/Each node in a graph can have ___parents
A. Only one
B. No node
C. One or more
D. At most two node
56/The enqueue operation____an item at the_______of the queue
A. Delete front
B. Delete end
C. Inserts front
D. Insert rear
57/A mechanism for arranging controlled access to a shared resource is________
A. Retrieving
B. Sorting
C. Balleting
D. Lock-out
E. None of the others
58/The octal equivalent af 1100101.001010 is
A. 624.12
B. 145.12
C. 154.12
D. 14591
E. None of the otherside
59/RISC ( reduced instruction set computer)- The strategy behind RISC architecture is
to have a small set of instructions that do a minimum number of_____
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
60/A data structure can be
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list