Question: 1
(Choose 1 answer)
………..separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
Question: 2
(Choose 1 answer)
A 17th-century computing machine that could perform addition and subtraction was the……
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine
Question: 3
(Choose 1 answer)
After the instruction is decoded, the control unit sends the task order to a component in the CPU.
What is this phase?.
A. Fetch phase
B. Decode phase
C. Execute phase
D. None of others
Question: 4
(Choose 1 answer)
RAM is used as a short memory because it is
A. Volatile
B. Has small capacity
C. Is very expensive
D. Is programmable
E. None of the others
Question: 5
(Choose 1 answer)
For surface organization of magnetic tape, the width of the tape is divided into nine tracks. Nine
vertical locations can store 8 bits of information related to a byte plus a bit for…….
A. Next block
B. Data
C. Next tape information
D. Error detection
Question: 6
(Choose 1 answer)
IBM-PC is an example of
A. A mainframe
B. Machine-in-built
C. Micro computer
D. Special purpose
E. None of the others
Question: 7
(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
Question: 8
(Choose 1 answer)
Computers are extremely fast and have fantastic memories. However, the only thing they can
remember is
A. Instruction
B. Series of 1s and Os
C. Boolean algebra
D. Logic theorems
E. None of the others
Question: 9 (Choose 1 answer)
Which of the following is equivalent to 12 in decimal?
Α. (1110)2
B. (C)16
C. (15)8
D. None of the others
Question: 10
(Choose 1 answer)
A group containing…… bits in the binary system are represented as one digit in the octal system.
A. 1
B. 2
C. 3
D. 4
E. None of the others
Question: 11
(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is….
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
Question: 12
(Choose 1 answer)
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
Α. 00011001
Β. 00110010
C. 11100111
D. 11110010
Question: 13
(Choose 1 answer)
The ASCII code for the character J is:
Α. 1001 0001
Β. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others
Question: 14 (Choose 1 answer)
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how
to calculate BIT RATE (R)?
A. B\times2S
B. 2B\times S
C. BxS
D. B2\times S2
Question: 15
(Choose 1 answer)
In the….. graphic method of representing an image in a computer, re-scaling of the image creates a
ragged or grainy image.
A. Bitmap
B. Vector
C. Quantized
D. Binary
Question: 16
(Choose 1 answer)
Use a arithmetic right shift operation on the bit pattern 1001 1000
Α. 0100 1100
Β. 1100 1100
C. 1101 1001
D. 1001 1000
Question: 17
(Choose 1 answer)
Use a simple left shift operation on the bit pattern 1001 1000
Α. 0001 1001
Β. 0001 1010
C. 0011 0000
D. 0011 0001
Question: 18
(Choose 1 answer)
Which physical topology uses a hub or switch?
A. Bus
B. Ring
C. Star
D. Bus and ring
Question: 19
(Choose 1 answer)
The TCP/IP model has ….layers.
A. Five
B. Six
C. Seven
D. Eight
Question: 20
(Choose 1 answer)
The format of an Ipv6 address is referred to as……
A. Dotted-hexadecimal notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. 8- Hexadecimal digits
Question: 21
(Choose 1 answer)
…..explicitly defines connection establishment, data transfer, connection teardown phases to provide a
connection-oriented service AND reliable protocol
A. TCP
B. UDP
C. IP
D. HTTP
Question: 22 (Choose 1 answer)
In a …. the directory system listing of the peers and what they offer uses the client-server paradigm, but
the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network
Question: 23
(Choose 1 answer)
A memory that does not change its contents without external causes is known as
A. Dynamic memory
B. Static memory
C. RAM
D. EEPROM
E. None of the others
Question: 24
(Choose 1 answer)
Which of the following is the user programmed semiconductor memory?
A. SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
Question: 25
(Choose 1 answer)
Which of the following holds data and processing instructions temporarily until the CPU needs it?
A. ROM
B. Control unit
C. Main memory
D. Coprocessor chips
E. None of the others
Question: 26
(Choose 1 answer)
A …. is a program in execution. It is a program that has started but has not finished
A. Program
B. Job
C. Process
D. Task
Question: 27 (Choose 1 answer)
What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state
Question: 28
(Choose 1 answer)
……is a step-by-step method for solving a problem or doing a task.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
Question: 29
(Choose 1 answer)
…….hides all the details of an algorithm in an attempt to give the 'big picture' and to show how the
algorithm flows from beginning to end.
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram
Question: 30
(Choose 1 answer)
—-----is a process in which an algorithm calls itself.
A. Insertion
B. Searching
C. Recursion
D. Iteration
Question: 31 (Choose 1 answer)
In….. unsorted list.sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the
A. Selection
B. Bubble
C. Insertion
D. Every
Question: 32
(Choose 1 answer)
The program in a high-level language is called the…..
A. Programming language
B. Source program
C. Translation
D. Interpretation
Question: 33
(Choose 1 answer)
The code that should be adequate for present and anticipated data processing both for machine and
human use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others
Question: 34
(Choose 1 answer)
In the —-- we can think of a program as an active agent that manipulates passive objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
Question: 35
(Choose 1 answer)
—---are names for memory locations
A. Variables
B. Imperative language
C. Identifiers
D. Data type
Question: 36
(Choose 1 answer)
A ……gives the user's view of a system: it shows how the user communicates with the system
A. Class diagram
B. State diagram
C. Use-case diagram
D. Sequence diagram
Question: 37
(Choose 1 answer)
One phase in system development is……
A. Analysis
B. Application
C. Designing
D. Collecting
Question: 38
(Choose 1 answer)
……between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
Question: 39
(Choose 1 answer)
What is quality referring to the ability to move software from one hardware platform to another
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability
Question: 40
(Choose 1 answer)
Testing a software system can involve….. testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box
Question: 41
(Choose 1 answer)
A data structure can be …..
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
Question: 42
(Choose 1 answer)
A …..is a collection of related elements possibly of different types having a single name
A. Array
B. Record
C. Linked list
D. Tree
Question: 43
(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies……. element of the linked list.
A. The first
B. The second
C. The last
D. Any
Question: 44 (Choose 1 answer)
Inside the ADT are two different parts of the model that are…… and….
A. Data structure and operations
B. Application program and public operations
C. Application program and private operations
D. Data struture and application program
Question: 45
(Choose 1 answer)
The—- of each node includes one of its children and all descendents of that child
A. Left tree
B. Binary tree
C. Subtree
D. Right tree
Question: 46
(Choose 1 answer)
The enqueue operation….. an item at the……. of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear
Question: 47
(Choose 1 answer)
A—- is a collection of data stored in the internal format of the computer. This contains data that is
meaningful only if it is properly interpreted by a program.
A. Text file
B. Bianry file
C. Sequential file
D. EOF
Question: 48
(Choose 1 answer)
When a sequential file is updated, the ….file contains a list of all errors occurring during the update
process.
A. New master
B. Old master
C. Transaction
D. Error report
Question: 49 (Choose 1 answer)
When a hashing algorithm produces an address for an insertion key and that address is already
occupied, it is called a……
A. Collision
B. Probe
C. Synonym
D. Linked list
(Choose 1 answer)
The intersection of a column and row in a spreadsheet is called a bon or
A. Key
B. Field
C. Cell
D. Menu
E. None of the others
In the network database model, the entities are organized in a….. through several paths in which some
entities can be accessed
A. Graph
B. Tree
C. Array
D. Record
Question: 52
(Choose 1 answer)
Each column in a relation is called…..
A. An attribute
B. A tuple
C. A union
D. An attitude
The unary……operation always results in a relation that has exactly one more row than the original
relation.
A. Insert
B. Delete
C. Update
D. Select
Question: 54
(Choose 1 answer)
……is the process by which a given set of relations are transformed to a new set of relations with a
more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
Question: 55
(Choose 1 answer)
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding
Question: 56
(Choose 1 answer)
Before transmission the sender transforms the plaintext into the ciphertext-this is….
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
Question: 57
(Choose 1 answer)
The ethical principle that dictates that an act is ethical when a majority of people in society agrees
with it is referred to as….
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
Question: 58
(Choose 1 answer)
……who create algorithms to break existing internet networks so as to solve the loopholes in them
A. Black Hat Hacker
B. Grey Hat Hacker
C. White Hat Hacker
D. Blue Hat Hacker
Question: 59
(Choose 1 answer)
In a stream cipher encryption and decryption are done one symbol. We have a plaintext stream a
ciphertext stream and a …..
A. Key block
B. Single key
C. Key stream
D. Auto key
Question: 60
(Choose 1 answer)
The RSA algorithm for confidentiality uses….. cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition
ĐÁP ÁN
1. C. High-level programming languages
2. A. Pascaline
3. C. Execute phase
4. A. Volatile
5. D. Error detection
6. C. Micro computer
7. B. Binary codes
8. B. Series of 1s and 0s
9. B. (C)16
10. C. 3
11. C. AA17
12. C. 11100111
13. C. 0100 1010
14. C. B×S
15. A. Bitmap
16. B. 1100 1100
17. C. 0011 0000
18. C. Star
19. A. Five
20. D. 8-Hexadecimal digits
21. A. TCP
22. C. Hybrid network
23. B. Static memory
24. C. EPROM
25. C. Main memory
26. C. Process
27. D. Waiting state
28. D. Algorithm
29. A. Pseudocode
30. C. Recursion
31. A. Selection
32. B. Source program
33. D. All of the others
34. D. Object-oriented paradigm
35. A. Variables
36. C. Use-case diagram
37. A. Analysis
38. B. Cohesion
39. B. Interoperability
40. D. Both black-box and glass-box
41. D. An array, a record, or a linked list
42. B. Record
43. A. The first
44. A. Data structure and operations
45. C. Subtree
46. D. Insert/rear
47. B. Binary file
48. D. Error report
49. A. Collision
50. C. Cell
51. A. Graph
52. A. An attribute
53. A. Insert
54. D. Normalization
55. A. Masquerading
56. C. Encryption
57. C. Social contract
58. C. White Hat Hacker
59. C. Key stream
60. A. Asymmetric-key