0% found this document useful (0 votes)
45 views76 pages

Nhom 2

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views76 pages

Nhom 2

Uploaded by

huynqbse180211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 76

1.

The______ deals with active objects instead of passive objects

A Procedural paradigm

B.Functional paradigm

C.Declarative paradigm

D. Object-oriented paradigm

2.The format of an IPv4 address _____ is referred to as

A. Dotted-binary notation

B. Dotted-octal notation

C. Dotted-decimal notation

D. Dotted-hexadecimal notation

3. A register in a CPU can hold

A. Only data

B. Only instructions

C. Only program counter values

D. Data, instruction, or program counter values

4. the ___ is a protocol that is used to define how the client-server Frvrams ¢ .." De WiFi

pages from the Web.

A. FIP

B. SMTP.

C. TELNET

D. HTTP

5. A program becomes a___ from the moment it is selected for execr/4- until." s finished« becomes a
program

A. Program

B. Job

C. Process

D. Task
6.In_______more than one program is in memory at the atthe same time and they are executed conci

CPU Switching rapidly between the programs,

A. Monoprogramming

B. Mustixogramming

C. microprogramming

D. Operating system

7. A billionth of a second is defined as a

A. Millisecond

B. Microsecond

C. Nanosecond

D. Piooseconds

E. None of the others

8. Which is another name for functional language?

A. Machine

B. Application language

C. Low-level language

D. High-level language

E. None of the others

9.

The role of the physical layer is to transfer the bits received from the data-link layer and covert___

for transmission.

A. Analog signals

B. Electromagnetic signals

C. Digital signals

D. Electronic signals

10. There are several methods for handling address collisions, each based on a different approach or
technique.

A. Independent
B. dependents.

C.Based on

D. Related

11. ___ is an ordered set of unambiguous steps that produce a result and terminate in a finite time.

A. A construct

B. A recursion

C. An iteration

D. An algorithm

12.In a three-level DBMS architecture, the layer that interacts directly with the hardware is the____level

A. External

B. Conceptual

C. Internal

D. Physical

13. Which of the following is taking the one's complement of the integer 001101107

A. 11001100

B. 11001111

C. 11001001

D. 11100110

14. A _________________ uses the principle of logical reasoning to answer queries. It is based on formal
logic defined by Greek mathematicians and later developed into firstorder predicate calculus

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

15.In the data link layer, a Bluetooth LAN is a(an)_ network

A. Wired WANs

B. Ad hoc

C. Dial-up service

D. Extended Service Set


16._____ is the breaking up of a large project into smaller parts.

A. Coupling

B. Incrementing

C. Obsolescence

D. Modularization

17. The ability of a computer system to remain operational despite various failures is

A. Relation

B. Schema

C. Resilience

D. Versatility

E. None of the others

18. Any device that performs signal conversion Is

A. Modulator

B. Modem

C. Keyboard

D. Plotter

E. None of the others

19. Defining the users, requirements, and methods is part of the phase

A. Analysis

B. Design

C. Implementation

D. Testing

20. In a___________ the project team needs to choose a language or a set of languages from among the
procedural

languages

A. Analysis phase

B. Design phase

C. Implementation phase

D. Testing phase
21. ____ can be threatened by security attacks

A. Confidentiality, cryptography, nonrepudiation

B. Confidentiality, encryption, decryption

C. Confidentiality, integrity, availability

D. Confidentiality, denial of service, masquerading

22. _____ protocol (s) is one of the protocols in the transport layer.

A. Only TCP

B. Only UDP

C. Only SCTP

D. TCP, UDP, and SCTP

23. Static RAM (SRAM) technology uses ___ The gates hold their state 0 or 1.

A. Ultraviolet light

B. Electronic impulses

C. Capacitors

D. Flip-flop gates

24. To search for elements, we can use ___ on sorted arrays that can help to decrease time complexity

A. Sequential search

B. Insertion sort

C. Selection sort

D. Binary search

25. C language is a(n)__ language.

A. Procedural

B. Functional

C. Declarative

D. Object-oriented

26. __is a unit that can add two inputs.

A. An ALU

B. A register

C. A control unit
D. A tape drive

27.The number of bits per sample is sometimes referred to as the ___

A. Quantization

B. Sampling rate

C. Encoding

D. Bit depth

28. The maximum value of an octal integer with K=2 digits is Nmax =

A. 63

B. 64

C. 65

D. 66

E. None of the others

29. A company’s product or service is identified as a

A. Trade mark

B. Trade secret

C. Patent

D. Copyright

30. Which of the following representations is erroneous?

A. (10211)2

B. (342)8

C. (EEE)16

D. 145

31. What is method in black-box testing which tests are designed to include representatives of boundary
values in

a range?

A. Boundary-value testing

B. Random testing

C. Exhaustive testing

D. Data flow testing


32. _____is a basic algorithm that adds a list of numbers.

A. Summation

B. Product

C. Smallest

D. Largest

33. A system program which helps the execution of user programs is known as

A. System software

B. Application program

C. Batch operating system

D. Utilities

E. None of the others

34. In the hierarchical database model, data is organized as an inverted_

A. Graph

B. Tree

C. Array

D. Record

35. ___can be measured by such metrics as mean time between failures number of bugs per thousand
lines of code and number of user requests for change.

A. Accuracy

B. Security

C. Efficiency

D. Correctability

36. In______s sort, the smallest item moves to the beginning of the unsorted list. [here is no one-to-one
swapping.

A. Selection

B. Bubble

C. Insertion

D. Every
37. IS an attack that reduce the capability of a computer system to function correctly or bring the system

down altogether by exhausting its resources.

A. DoS

B. Trojan horses

C. Worms

D. Viruses

38. Why OS is responsible for the efficient use of input/output devices?

A. Because need to maintains a queue for each input/output device

B. Because these devices are slower in speed compared with the CPU and memory

C. It may use FIFO for one device

D. The manager also needs to know when a device has finished serving one process

39. Use a simple right shift operation on the bit pattern 1001 1000.

A. 1001 1001

B. 1001 1000

C. 0100 1101

D. 0100 1100

40. The operation that takes two relations and combines them based on common attributes is the

operation.

A. Join

B. Project

C. Union

D. Intersection

41. In a positional number system with base b, we can always find the number of digits of an integer. So
how many digits can we find in the decimal number 234 in decimal?

A.1

B.2

C.3

D.4
42. We not an operating system component?

A. File access management program

B. Device driver program

C. Program scheduler for process

D. Free memory management program

43. _______is the process by which a given set of relations are transformed to a new set of relations
with a more solid structure.

A. Relational database

B. Database system

C. Atomic operations

D. Normalization

44. Each row in a relation is called

A. An attribute

B. A tuple

C. Aunion

D. An attitude

45. lf the ASCII code for E is 1000101, then the ASCII code for e is_________ . Answer the question

consulting the ASCII table.

A. 1000110

B. 1000111

C. 0000110

D. 1100101

46. The push operation ___off the stack.

A. Deletes an item from the top

B. Deletes an item from the bottom

C. Inserts an item at the top

D. Inserts an item at the bottom


47. We use the search for an ordered list.

A. Sequential

B. Binary

C. Bubble

D. Insertion

48. An________ is a sequence of operands and operators that reduces to a single value

A. Expression

B. Operator

C. Variables

D. Input/output

49._______ is a series of randomized letters and numbers which humans cannot make any sense of.

A. Plain text

B. Cipher text

C. Encryption

D. Decryption

50. A__is a collection of related elements possibly of different types having a single name

A. Array

B. Record

C. Linked list

D. Tree

51. In cryptography, everyone has access to everyone's public key.

A. Symmetric-key

B. Asymmetric-key

C. Secret-key

D. Private-key
52. In ________, the program can be divided into equally sized sections called pages, but the pages need
not be in memory at the same time for execution.

A. Partitioning

B. Paging

C. Demand paging

D. Demand segmentation

53. Ina____ the relationship between a character in the plaintext to a character in the ciphertext is one-
to-many -

A. Monoalphabetic cipher

B. Substitution cipher

C. Polyalphabetic cipher

D. Transposition cipher

54. Use a circular right shift operation on the bit pattern 1001 1000

A. 0100 1100

B. 0011 0001

C. 1001 1001

D. 1001 1000

55. Which type of computers use the 8 bit code called EBCDIC?

A. Minicomputers

B. Microcomputers

C. Mainframe computers

D. Supercomputers

E. None of the others

56. Ahashedfileusesa_ sto. accomplish this mapping.

A. Retrived file

B. Sequential access

C. Random access

D. Mathematical function
57. Who is considered the ‘father’ of the minicomputer and one of the founder fathers of the modern
computer industry world-wide?

A. George Tate

B. Kenneth H. Olsen

C. Seymour Cray

D. Basic Pascal

E. None of the others

58. In_____ edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x, y), x Is
called the

starting point and y is called the endpoint of the edge.

A. Directed graph

B. Undirected graph

C. Edges

D. Ares

59. The attack that reduces the capability of a computer is called a________ attack.

A. Penetration

B. Denial of service

C. Either a or b

D. Neither a nor b

60. How can we set name of nodes in a linked list?

A. Depend on user

B. Name of the pointer

C. Implicit ones

D. Name of the head pointer


. None of the others

You might also like