INTRODUCTION TO CE FINAL EXAMPLE
INTRODUCTION TO CE FINAL EXAMPLE
CHAPTER 1
1. Which of the following Boolean operations produces the output 1 for the fewest number of
input patterns?
A. AND B. OR C. XOR
2. Which of the following best describes the NOR operation?
A. An XOR followed by a NOT B. An OR followed by a NOT C. A NOT followed by a
NOT C. An AND followed by a NOT
3. Which of the following bit patterns cannot be expressed in hexadecimal notation?
A. 11111111 B. 1001 C. 110011 D. 100000000001
4. Which of the following is the binary representation of 4 5/8?
A. 100.11 B. 10.011 C. 110.101 D. 100.101
5. Which of the following bit patterns represents the value 5 in two’s complement notation?
A. 00011010 B. 11111011 C. 00000101 D. 11111011
6. Which of the following bit patterns represents the value -5 in two’s complement notation?
A. 00011010 B. 11111011 C. 00000101 D. 11111011
7. What is the result of the following addition problem (using two’s compliment notation)?
00001111 + 10101010 A. 011000101 B. 10111001 C. 01010101 D. 10110101
8. What is the result of the following subtraction problem (using two’s compliment notation)?
00001111 - 10101010 A. 011000101 B. 10111001 C. 01010101 D. 10110101
9. In which of the following addition problems (using two’s complement notation) does an
overflow error occur?
A. 0011 B. 0100 C. 1100 + 1010 + 0100 + 1100
10. Which of the following representations in two’s complement notation represents the
largest value?
A. 00000010 B. 11111111 C. 00000001 D. 11111110
11. Which of the following representations in two’s complement notation represents the
smallest value?
A. 00000010 B. 11111111 C. 00000001 D. 11111100
12. Which of the following bit patterns (represented in hexadecimal notation) represents a
negative number in two’s complement notation?
A. 7F B. 55 C. A6 D. 08
13. Which of the following bit patterns (represented in hexadecimal notation) represents a
positive number in two’s complement notation?
A. 7F B. F7 C. A8 D. 8A
14. What value is represented by the bit pattern 01011100 when interpreted using floating-
point format in which the most significant bit is the sign bit, the next three bits represent the
exponent field in excess notation, and the last four bits represent the mantissa?
A. -1 1/2 B. 1 1/2 C. -3/8 D. 3/8
15. Which of the following values cannot be stored accurately using a floating-point format
in which the most significant bit is the sign bit, the next three bits represent the exponent field
in excess notation, and the last four bits represent the mantissa?
A. 2 1/2 B. 3/16 C. 7 D. 6 1/4
16. Which of the following bit-patterns represents the smallest value using the floating-point
format in which the most significant bit is the sign bit, the next three bits represent the
exponent field in excess notation, and the last four bits represent the mantissa?
A. 01001000 B. 01011000 C. 00101000 D. 01111000
17. Which of the following data storage systems provides the most efficient random access to
individual data items?
A. Main memory B. Magnetic disk C. CDs/DVDs D. Flash drives
18. Which of the following storage systems is best suited for storing and retrieving long
strings of data that are processed in their sequential order?
A. Main memory B. Magnetic disk C. CDs/DVDs
19. Which of the following mass storage system does not require physical motion?
A. Magnetic tape B. Magnetic disk C. DVDs D. Flash drives
20. Assuming that each of the following bit patterns originally had even parity, which one
contains an error?
A. 100110100 B. 110000011 C. 000011000 D. 100001001
21. How many errors per pattern could be corrected when using an error-correcting code in
which any two code patterns differ by a Hamming distance of 8?
A. 3 B. 4 C. 5 D. 6
22. Which of the following is a possible LZW compression of the message “xyz xyz xyz”?
A. 1234 B. 1234545 C. 232 D. 12
23. How many different symbols can be encoded using Unicode?
A. 256 B. 4,096 C. 65,536 D. 1,046,476
24. Which of the following systems is least efficient when encoding numeric values?
A. Two’s complement notation B. Excess notation C. ASCII D. Floating-point notation
25. Which of the following is a means of encoding music?
A. ASCII B. MIDI C. JPEG D. GIF
26. Which of the following provides a compressed representation of an image by limiting the
number of different pixel colors to 256, thereby enabling each pixel in an image to be
represented by a single byte whose value indicates which of a palette of entries represents the
pixel’s color?
A. ASCII B. MPEG C. JPEG D. GIF
CHAPTER 2
1. Which of the following is not contained in a CPU?
A. Instruction register B. Program counter C. General-purpose register D. Memory cell
2. Which of the following instructions (as described in the language description table)
changes the contents of a memory cell?
A. 10AB B. 20AB C. 30AB D. 40AB
3. Which of the following instructions (as described in the language description table) places
00000000 in register A?
A. 1A00 B. 2A00 C. 3A00 D. 200A
4. Which of the following instructions (as described in the language description table) places
00000000 in register 5?
A. 25FF B. 9555 C. 15FF D. 8555
5. Which of the following instructions (as described in the language description table) will
not change the contents of register 5?
A. 1508 B. 2508 C. A503 D. A508
6. Which of the following instructions (as described in the language description table) is
equivalent to requesting that register A be rotated to the left by three bits?
A. AA05 B. AA03 C. AA08 D. AA01
7. Which of the following instructions (as described in the language description table)
changes the contents of register 7?
A. 4077 B. 4075 C. 4057 D. 37BB
8. Which of the following is not a form of parallel processing?
A. SISD B. MIMD C. SIMD
9. In which of the following locations is information most readily available for manipulation
by the CPU?
A. General-purpose registers B. Main memory C. Mass storage
10. The bus in a computer is an example of which form of communication?
A. Serial B. Parallel C. Neither A nor B
11. Which of the following instructions does not fall in the category of arithmetic/logic
instructions?
A. ROTATE B. ADD C. OR D. JUMP
12. Which of the following instructions falls in the category of data transfer instructions?
A. LOAD B. AND C. ROTATE D. JUMP
13. Which of the following is not a component of a machine instruction?
A. Op-code B. Port C. Operand
14. Which of the following is not an activity performed entirely within a CPU?
A. Fetch instructions B. Perform Boolean operations C. Perform arithmetic operations D.
Move data between registers
15. What mask in register F would cause the instruction 8AAF (refer to the language
description table) to put a 0 in the most significant bit of register A without disturbing the
other bits?
A. 11111110 B. 00000001 C. 10000000 D. 011111111
16. What mask in register F would cause the instruction 7AAF (refer to the language
description table) to put a 1 in the most significant bit of register A without disturbing the
other bits?
A. 11111110 B. 00000001 C. 10000000 D. 011111111
17. Which of the following instructions will not produce the same result as the other two?
(Refer to the language description table.)
A. A502 B. A506 C. A50A
18. Which of the following instructions will not produce the same result as the other two?
(Refer to the language description table.)
A. 9555 B. 2500 C. 1500
19. If register A contained the pattern 00000000, which of the following instructions could
alter the contents of register 0? (Refer to the language description table.)
A. 700A B. 800A C. 900A
20. Which of the following instructions (as described in the language description table) is
essentially an unconditional jump?
A. B033 B. B133C. B233D. B333
CHAPTER 3
1. Which of the following components of an operating system maintains the directory
system?
A. Device drivers B. File manager C. Memory manager
2. Which of the following components of an operating system handles the details associated
with particular peripheral equipment?
A. Device drivers B. File manager C. Memory manager
3. Which of the following components of an operating system is not part of the kernel?
A. Shell B. File manager C. Scheduler
4. Multitasking in a computer with only one CPU is accomplished by a technique called
A. Bootstrapping B. Batch processing C. Multiprogramming
5. Execution of an operating system is initiated by a program called the
A. Window manager B. Scheduler C. Bootstrap
6. The end of a time slice is indicted by the occurrence of a signal called
A. An interrupt B. A semaphore C. A login
7. A section of a program that should be executed by at most one process at a time is called a
A. Utility B. Critical region C. Privileged instruction
8. Which of the following is not an attempt to provide security?
A. Passwords B. Privilege levels C. Multitasking
9. Which of the following items of information would not be contained in an operating
system’s process table?
A. The location of the memory area assigned to the process B. The priority of each process
C. Whether the process is ready or waiting D. The machine language instructions being
executed by the process
10. Which of the following events is detrimental to an operating system’s performance?
A. Deadlock B. Interrupt C. Booting
11. Which of the following is a technique for controlling access to a critical region?
A. Spooling B. Time sharing C. Semaphore D. Booting
12. Which of the following is not involved in a context switch?
A. Interrupt B. Process table C. Dispatcher D. Shell
13. Which of the following concepts is not associated with critical regions?
A. Semaphores B. Mutual exclusion C. Bootstrap
14. Which of the following is not a role of a typical operating system?
A. Control the allocation of the machine’s resources B. Control access to the machine
C. Maintain records regarding files stored in mass storage D. Assist the computer user in the
task of processing digital photographs
15. Which of the following is a task that is not performed by the kernel of an operating
system?
A. Communicate with the user B. Schedule processes C. Allocate resources D. Avoid
deadlock
16. Which of the following is not a means of performing multiple activities at the same time?
A. Pipeling B. Multiprogramming C. Virtual memory D. Multiple processors
17. Which of the following components of an operating system is executed as the result of an
interrupt signal?
A. Dispatcher B. Memory manager C. File manager
18. Which of the following would be a concern of the file manager in a multi-user computer
system that would not be a concern in a single-user system?
A. Maintain records regarding the location of files B. Maintain records regarding the
ownership of files C. Maintain records regarding the size of files D. None of the above
19. Which of the following would not require real-time processing?
A. Typing a document with a word processor B. Navigation of an aircraft C. Forecasting
word-wide trade for the next five year period D. Maintaining a airline reservation system
20. Which of the following statements is true?
A. Allowing several processes to share time in a multiprogramming system is less efficient
than executing each of them to completion one after the other. B. The use of passwords
provides an impenetrable safeguard. C. Both A and B D. Neither A not B
CHAPTER 4
1. Which of the following is not a way of classifying networks?
A. WAN versus LAN B. Closed versus open C. Router versus bridge D. Star versus bus
2. Ethernet is a means of implementing which of the following network topologies?
A. Star B. WiFi C. Bus
3. Which of the following connects existing networks to form an internet?
A. Bridge B. Router C. Switch D. Repeater
4. Which of the following is a protocol for controlling the right to transmit a message in a
network?
A. UDP B. CSMA/CD C. TCP D. FTP
5. Which of the following is not a means of performing interprocess communication over a
network?
A. Client/server B. ICANN C. Peer-to-peer
6. Which of the following is assigned the task of providing individual users access to the
Internet?
A. Tier-1 ISPs B. Tier-2 ISPs C. Access ISPs D. ICANN
7. Which of the following is not an application of the Internet?
A. FTP B. Email C. Telnet D. CERT
8. The primary purpose of which of the following is not the enhancement of security?
A. ICANN B. Firewall C. Encryption D. CERT
9. Which of the following is used to translate between IP addresses and mnemonic addresses?
A. File server B. Mail server C. Name server D. FTP server
10. Which of the following is not a means of connecting networks?
A. Switch B. Server C. Router D. Bridge
11. Which layer of the TCP/IP hierarchy actually transmits a message?
A. Application B. Transport C. Network D. Link
12. Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible
with the Internet?
A. Application B. Transport C. Network D. Link
13. Which layer of the TCP/IP hierarchy decides the direction in which message segments are
transferred across the Internet?
A. Application B. Transport C. Network D. Link
14. Which layer of the TCP/IP hierarchy decides which application should receive an
incoming message?
A. Application B. Transport C. Network D. Link
15. Which layer of the TCP/IP hierarchy presents incoming messages to the computer user?
A. Application B. Transport C. Network D. Link
16. Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the
destination?
A. Application B. Transport C. Network D. Link
17. Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a
message’s destination?
A. Application B. Transport C. Network D. Link
18. Which of the following identifies the application to which a message arriving from the
Internet should be given?
A. Protocol B. Port number C. Domain D. Hop count
19. Which standards organization produced the OSI reference model for internet
communication?
A. ANSIB. IEEE C. ISO
20. Which of the following is an Internet application that is named after its underlying
protocol?
A. Email B. World Wide Web C. FTP D. UDP
21. Which of the following is not a means of implementing server-side activities?
A. CGI B. JSP C. ASP D. Applets
22. Which of the following is not a protocol used in the basic TCP/IP software hierarchy?
A. POP3 B. UDP C. TCP D. IP
CHAPTER 5
1. Which of the following is an activity?
A. Algorithm B. Program C. Process
2. Which of the following is a representation?
A. Algorithm B. Program C. Process
3. Which of the following set of instructions defines an algorithm in the formal, strict sense?
A. X <-- 3; B. X <-- 3; C. X <-- 3;
while (X < 5)do while (X < 5) do while (X < 5) do
(X <-- X) (X <-- X + 1) (X <-- X - 1)
4. Which of the following is not a means of repeating a block of instructions?
A. Pretest loop B. Posttest loop C. Recursion D. Assignment statement
5. When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan,
Tom which of the following entries will be found most quickly using the sequential search
algorithm?
A. Lewis B. Pat C. Tom
6. When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan,
Tom which of the following entries will be found most quickly using the binary search
algorithm?
A. Lewis B. Pat C. Tom
7. Which of the following lists would not be obtained at some point when applying the
insertion sort algorithm to the list below? Sylvia Nancy Lois Alice
A. Nancy, Sylvia, Lois, Alice B. Alice, Lois, Nancy, Sylvia C. Alice, Sylvia, Nancy, Lois
D. Lois, Nancy, Sylvia, Alice ANSWER: C
16. Which of the following is a loop invariant at the point at which the test for termination is
performed in the following loop structure?
X <-- 3;
repeat (X<-- X + 2)
until (X > 5)
A. N > 0 B. N = 0 C. N < 0
18. Preconditions, postconditions, and loop invariants are examples of which of the
following?
A. Pseudocode B. Iterative structures C. Assertions D. Recursion
19. Which of the following does not print the same sequence of numbers as the others?
A. X <-- 5 B. X <-- 4 C. X <-- 5
while (X < 6) do while (X < 5) do repeat (print the value of X
(print the value of X; (X <-- X+1; X <-- X + 1)
X <-- X + 1) print the value of X) until (X > 6)
CHAPTER 6
1. Which of the following is an example of a language that is based on the functional
paradigm?
A. LISP B. PROLOG C. C D. C++
2. Which of the following is an example of a language that is based on the object-oriented
paradigm?
A. LISP B. PROLOG C. C D. C++
3. Most machine languages are based on the
A. Imperative paradigm B. Declarative paradigm C. Functional paradigm D. Object-oriented
paradigm
4. Which of the following is not a type of statement found in a typical high-level imperative
programming language?
A. Imperative statement B. Exclamatory statement C. Declarative statement D. Comment
statement
5. Which of the following does not require a Boolean structure?
A. If-then-else statement B. While loop statement C. Assignment statement D. For loop
statement
6. Which of the following is not a control statement?
A. If-then-else statement B. While loop statement C. Assignment statement D. For loop
statement
7. Which of the following is not a step in the process of translating a program?
A. Executing the program B. Parsing the program C. Lexical analysis D. Code generation
8. Which of the following is not associated with object-oriented programming?
A. Inheritance B. Resolution C. Encapsulation D. Polymorphism
9. Which of the following is not associated with the concept of data type?
A. Coercion B. Boolean C. Operator precedence D. Strongly typed language
10. Positions within arrays are identified by means of numbers called
A. Indices B. Parameters C. Instance variables D. Constants
11. Which of the following is ignored by a compiler?
A. Control statements B. Declarations of constants C. Procedure headers D. Comment
statements
12. Which of the following is not a possible value of the expression 4 + 6 / 2 - 1
A. 4 B. 5 C. 6 D. 10
13. Which of the following is not a way of referring to a value in a program?
A. Variable B. Literal C. Constant D. Type
14. Which of the following is the scope of a variable?
A. The number of characters in the variable’s name B. The portion of the program in which
the variable can be accessed C. The type associated with the variable D. The structure
associated with the variable
15. Which of the following is a means of nullifying conflicts among data types?
A. Inheritance B. Parsing C. Coercion D. Code optimization
16. Which of the following is not constructed by a typical compiler?
A. Source code B. Symbol table C. Parse tree D. Object program
17. Which of the following is a means of defining similar yet different classes in an object-
oriented program?
A. Inheritance B. Parsing C. Coercion D. Code optimization
18. Which of the following statements is not a resolvent of the following clauses?
P OR Q OR --R --P OR T --Q OR T R OR T
A. Q OR --R OR T B. T OR P C. P OR --R OR T D. Q OR T
19. Which of the following can Prolog conclude from the following program?
parent(jill, sue). parent(jill, sally). parent(john, sue). parent(john, sally). sibling(X, Y) :-
parent(Z, X), parent(Z, Y).
A. parent(jill, john) B. sister(sue, sally) C. sibling(sue, sally) D. sibling(jill, sue)
CHAPTER 7
1. Which of the following software engineering methodologies is the most rigid?
A. Incremental model B. Waterfall model
C. Extreme programming D. Evolutionary prototyping
6. The use of design patterns in software engineering was adopted from what other field?
A. Business administration B. Architecture
C. Biology D. Chemistry
9. Which of the following terms refers to an action that is not readily apparent from a written
program?
A. Consequence B. Side effect C. Specification D. Bug
10. Which of the following is a way of testing the design of a software system?
A. Entity-relationship diagram B. Collaboration diagram
C. Structure chart D. Structured walkthrough
12. Which of the following is represented in a collaboration diagram but not in a class
diagram?
A. Basic relationships between classes B. The classes themselves
C. Communication between class instances D. The number of objects in the system
15. The Pareto principle is applied during which phase of software development?
A. Analysis B. Design C. Implementation D. Testing
17. Which of the following is not a tool for designing modular systems?
A. Structure charts B. Data dictionaries
C. Class diagrams D. Collaboration diagrams
20. If a class diagram indicates a one-to-one relationship between class X and class Y, then
A. there will be only one object in the system of “type” X.
B. each object of “type” X will be associated with only one object of “type” Y.
C. there will be exactly one object of “type” X and exactly one object of “type” Y.
D. an object of “type” Y cannot occur without first constructing an object of “type” X.
21. Copyright laws were established
A. to allow authors to distribute their work while maintaining certain ownership rights.
B. to allow authors to maintain ownership of their ideas.
C. to restrict access to publications to certain groups within society.
D. to allow ideas to be traced back to their origins.
CHAPTER 8
3. Which of the following is static in the sense that it does not change size or shape as
information is stored and retrieved?
A. Array B. Stack C. Queue D. Tree
4. Suppose you were going to retrieve items of data that you would later need to process in
the opposite order from that in which they were retrieved. Which of the following would be
the best structure in which to store the items?
A. Traditional linked list B. Stack C. Queue D. Tree
5. Suppose a binary tree contained the nodes W, X, Y, and Z. If W and X were children of Y,
and Z had no children, which node would be the root?
A. W B. X C. Y D. Z
6. Suppose a binary tree contained the nodes W, X, Y, and Z, and each node had at most one
childHow many terminal nodes would be in the tree?
A. One B. Two C.Three D. Undetermined
7. If the two-dimensional array X were stored in row-major order, then in the block of main
memory containing X, which of the following would be true?
A. The entry X[1,2] would appear before X[2,1].
B. The entry X[1,2] would appear after X[2,1].
C. The entry X[1,2] would be in the same location as X[2,1].
D. None of the above
8. Which of the following is not used when determining the location of an entry in a two-
dimensional homogeneous array stored in row-major order?
A. Indices B. Number of rows in the array C. Address polynomial D. Number of columns
in the array
9. Which of the following is not a means of locating an entry in a linked storage structure?
A. Head pointer B. Child pointer C. Root pointer D. NIL pointer
10. If a stack contained the entries w, x, y, z (from top to bottom), which of the following
would be the contents after two entries were removed and the entry r was inserted?
A. w, x, r B. y, z, r C. r, y, z D. r, w, x
11. If a queue contained the entries w, x, y, z (from head to tail), which of the following
would be the contents after two entries were removed and the entry r was inserted?
A. w, x, r B. y, z, r C. r, y, z D. r, w, x
12. If the number of nodes in a binary tree is 2^n (where n is a positive integer), then the
entire tree would contain at least
A. 2^n + 1 nodes B. 2^(2n) nodes C. 2^(n+1) - 1 nodes D. 2^(n+2) nodes
13. If the longest path in a binary tree contained exactly four nodes, what is the maximum
number of nodes that could be in the entire tree?
A. 4 B. 7 C. 15 D. 31
C B
CHAPTER 9
2. Which of the following describes only the portion of a database available to a particular
user?
A. Database model B. Schema C. Subschema D. DBMS
3. Which of the following relational operations combine data from more than one relation?
A. SELECT B. PROJECT C. JOIN
4. Which of the following relational operations extracts entire columns from a relation?
A. SELECT B. PROJECT C. JOIN
5. Which of the following relational operations extracts entire rows from a relation?
A. SELECT B. PROJECT C. JOIN
6. Which of the following relational operations is performed by the SQL statement below?
select A, B, C from X
A. SELECT B. PROJECT C. JOIN
7. Given the relation X below
X: A B C
257
333
432
528
what value will be extracted by the following query ?
TEMP <- SELECT from X where B > C
RESULT <- PROJECT A from TEMP
A. 2 B. 3 C. 4 D. 5
11. Which of the following is not a potential problem caused by multiple transactions
manipulating a database at the same time?
A. Lost update problem B. Clustering C. Deadlock D. Incorrect summary problem
12. Which of the following features within a DBMS is not provided to maintain database
integrity?
A. Concurrent transaction processing B. Log C. Locking protocol D. Commit points
13. Which of the following data mining techniques would be applied when trying to identify
traits that characterize the citizens of a democracy who fail to vote?
A. Class description B. Class discrimination C. Cluster analysis D. Association analysis
14. Which of the following data mining techniques would be applied when trying to identify
traits that predict whether a citizen in a democracy will or will not vote?
A. Class description B. Class discrimination C. Cluster analysis D. Association analysis
15. Which of the following data mining techniques would be applied when trying to identify
any underlying heterogeneity within housing patterns in a community?
A. Class description B. Class discrimination C. Cluster analysis D. Association analysis
16. Which of the following data mining techniques would be applied when trying to identify
common properties between different groups of shoppers?
A. Class description B. Class discrimination C. Cluster analysis D. Association analysis
17. Which of the following file structures is most efficient in cases in which the file is always
processed in its entirety a predetermined order?
A.Hash B.Indexed C.Sequential
18. Which of the following file structures is commonly used for the storage of text files?
A. Sequential B. Indexed C. Hash
19. Which of the following file structures is associated with the problem of clustering?
A.Hash B.Indexed C.Sequential
20. Which of the following file structures requires a small "auxiliary" storage system that
must be updated as entries in the file are inserted or deleted.
A. Hash B. Indexed C.Sequential
CHAPTER 10
1. Which of the following is not associated with a parallel projection?
A. Projection plane
B. Projectors
C. Center of projection
D. All of the above
8. The phenomenon of a light ray bending as it passes through materials of different density
is called
A. Reflection
B. Incidence
C. Refraction
D. Ray tracing
10. Which of the following is not a step in the traditional rendering pipeline?
A. Scan conversion
B. Rasterization
C. In-betweening
D. Clipping
16. Which of the following is an advantage of ray tracing over the traditional rendering
pipeline?
A. It is less time consuming.
B. It implements a local lighting model.
C. It can be implemented in real time.
D. It implements a global lighting model.
19. Producing a sequence of frames to fill the gap between key frames is called
A. Storyboarding
B. Morphing
C. In-betweening
D. Motion capture
20. Motion capture is a means of applying
A. A global lighting model
B. A local lighting model
C. Dynamics
D. Kinematics