0% found this document useful (0 votes)
69 views14 pages

Source Csi

Uploaded by

caotuan01122005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views14 pages

Source Csi

Uploaded by

caotuan01122005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Question: 1

(Choose 1 answer)
………..separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems

Question: 2
(Choose 1 answer)
A 17th-century computing machine that could perform addition and subtraction was the……
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine

Question: 3
(Choose 1 answer)
After the instruction is decoded, the control unit sends the task order to a component in the CPU.
What is this phase?.
A. Fetch phase
B. Decode phase
C. Execute phase
D. None of others

Question: 4
(Choose 1 answer)
RAM is used as a short memory because it is
A. Volatile
B. Has small capacity
C. Is very expensive
D. Is programmable
E. None of the others

Question: 5
(Choose 1 answer)
For surface organization of magnetic tape, the width of the tape is divided into nine tracks. Nine
vertical locations can store 8 bits of information related to a byte plus a bit for…….
A. Next block
B. Data
C. Next tape information
D. Error detection

Question: 6
(Choose 1 answer)
IBM-PC is an example of
A. A mainframe
B. Machine-in-built
C. Micro computer
D. Special purpose
E. None of the others
Question: 7
(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

Question: 8
(Choose 1 answer)
Computers are extremely fast and have fantastic memories. However, the only thing they can
remember is
A. Instruction
B. Series of 1s and Os
C. Boolean algebra
D. Logic theorems
E. None of the others

Question: 9 (Choose 1 answer)


Which of the following is equivalent to 12 in decimal?
Α. (1110)2
B. (C)16
C. (15)8
D. None of the others

Question: 10
(Choose 1 answer)
A group containing…… bits in the binary system are represented as one digit in the octal system.
A. 1
B. 2
C. 3
D. 4
E. None of the others

Question: 11
(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is….
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

Question: 12
(Choose 1 answer)
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
Α. 00011001
Β. 00110010
C. 11100111
D. 11110010

Question: 13
(Choose 1 answer)
The ASCII code for the character J is:
Α. 1001 0001
Β. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others

Question: 14 (Choose 1 answer)


If we call the bit depth or number of bits per sample B, the number of samples per second S, so how
to calculate BIT RATE (R)?
A. B\times2S
B. 2B\times S
C. BxS
D. B2\times S2

Question: 15
(Choose 1 answer)
In the….. graphic method of representing an image in a computer, re-scaling of the image creates a
ragged or grainy image.
A. Bitmap
B. Vector
C. Quantized
D. Binary

Question: 16

(Choose 1 answer)

Use a arithmetic right shift operation on the bit pattern 1001 1000

Α. 0100 1100

Β. 1100 1100

C. 1101 1001

D. 1001 1000

Question: 17

(Choose 1 answer)

Use a simple left shift operation on the bit pattern 1001 1000
Α. 0001 1001

Β. 0001 1010

C. 0011 0000

D. 0011 0001

Question: 18

(Choose 1 answer)

Which physical topology uses a hub or switch?

A. Bus

B. Ring

C. Star

D. Bus and ring

Question: 19

(Choose 1 answer)

The TCP/IP model has ….layers.

A. Five

B. Six

C. Seven

D. Eight

Question: 20

(Choose 1 answer)

The format of an Ipv6 address is referred to as……

A. Dotted-hexadecimal notation
B. Dotted-octal notation

C. Dotted-decimal notation

D. 8- Hexadecimal digits

Question: 21

(Choose 1 answer)

…..explicitly defines connection establishment, data transfer, connection teardown phases to provide a
connection-oriented service AND reliable protocol

A. TCP

B. UDP

C. IP

D. HTTP

Question: 22 (Choose 1 answer)

In a …. the directory system listing of the peers and what they offer uses the client-server paradigm, but
the storing and downloading of the files are done using the peer-to-peer paradigm.

A. WWW

B. Centralized network

C. Hybrid network

D. Decentralized network

Question: 23

(Choose 1 answer)

A memory that does not change its contents without external causes is known as

A. Dynamic memory

B. Static memory

C. RAM

D. EEPROM
E. None of the others

Question: 24

(Choose 1 answer)

Which of the following is the user programmed semiconductor memory?

A. SRAM

B. DRAM

C. EPROM

D. All of the others

E. None of the others

Question: 25

(Choose 1 answer)

Which of the following holds data and processing instructions temporarily until the CPU needs it?

A. ROM

B. Control unit

C. Main memory

D. Coprocessor chips

E. None of the others

Question: 26

(Choose 1 answer)

A …. is a program in execution. It is a program that has started but has not finished

A. Program

B. Job

C. Process
D. Task

Question: 27 (Choose 1 answer)


What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state

Question: 28
(Choose 1 answer)
……is a step-by-step method for solving a problem or doing a task.
A. A construct
B. A recursion
C. An iteration
D. An algorithm

Question: 29
(Choose 1 answer)
…….hides all the details of an algorithm in an attempt to give the 'big picture' and to show how the
algorithm flows from beginning to end.
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram

Question: 30
(Choose 1 answer)
—-----is a process in which an algorithm calls itself.
A. Insertion
B. Searching
C. Recursion
D. Iteration

Question: 31 (Choose 1 answer)


In….. unsorted list.sort, the smallest item from the unsorted list is swapped with the item at the
beginning of the
A. Selection
B. Bubble
C. Insertion
D. Every

Question: 32
(Choose 1 answer)
The program in a high-level language is called the…..
A. Programming language
B. Source program
C. Translation
D. Interpretation

Question: 33
(Choose 1 answer)
The code that should be adequate for present and anticipated data processing both for machine and
human use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others

Question: 34
(Choose 1 answer)
In the —-- we can think of a program as an active agent that manipulates passive objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

Question: 35
(Choose 1 answer)
—---are names for memory locations
A. Variables
B. Imperative language
C. Identifiers
D. Data type

Question: 36
(Choose 1 answer)
A ……gives the user's view of a system: it shows how the user communicates with the system
A. Class diagram
B. State diagram
C. Use-case diagram
D. Sequence diagram

Question: 37
(Choose 1 answer)
One phase in system development is……
A. Analysis
B. Application
C. Designing
D. Collecting

Question: 38
(Choose 1 answer)
……between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion

Question: 39
(Choose 1 answer)
What is quality referring to the ability to move software from one hardware platform to another
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability

Question: 40
(Choose 1 answer)
Testing a software system can involve….. testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box

Question: 41
(Choose 1 answer)
A data structure can be …..
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list

Question: 42
(Choose 1 answer)
A …..is a collection of related elements possibly of different types having a single name
A. Array
B. Record
C. Linked list
D. Tree

Question: 43
(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies……. element of the linked list.
A. The first
B. The second
C. The last
D. Any
Question: 44 (Choose 1 answer)
Inside the ADT are two different parts of the model that are…… and….
A. Data structure and operations
B. Application program and public operations
C. Application program and private operations
D. Data struture and application program

Question: 45
(Choose 1 answer)
The—- of each node includes one of its children and all descendents of that child
A. Left tree
B. Binary tree
C. Subtree
D. Right tree

Question: 46
(Choose 1 answer)
The enqueue operation….. an item at the……. of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear

Question: 47
(Choose 1 answer)
A—- is a collection of data stored in the internal format of the computer. This contains data that is
meaningful only if it is properly interpreted by a program.
A. Text file
B. Bianry file
C. Sequential file
D. EOF

Question: 48
(Choose 1 answer)
When a sequential file is updated, the ….file contains a list of all errors occurring during the update
process.
A. New master
B. Old master
C. Transaction
D. Error report

Question: 49 (Choose 1 answer)


When a hashing algorithm produces an address for an insertion key and that address is already
occupied, it is called a……
A. Collision
B. Probe
C. Synonym
D. Linked list

(Choose 1 answer)
The intersection of a column and row in a spreadsheet is called a bon or
A. Key
B. Field
C. Cell
D. Menu
E. None of the others

In the network database model, the entities are organized in a….. through several paths in which some
entities can be accessed
A. Graph
B. Tree
C. Array
D. Record

Question: 52
(Choose 1 answer)
Each column in a relation is called…..
A. An attribute
B. A tuple
C. A union
D. An attitude

The unary……operation always results in a relation that has exactly one more row than the original
relation.
A. Insert
B. Delete
C. Update
D. Select

Question: 54
(Choose 1 answer)
……is the process by which a given set of relations are transformed to a new set of relations with a
more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization

Question: 55
(Choose 1 answer)
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding

Question: 56
(Choose 1 answer)
Before transmission the sender transforms the plaintext into the ciphertext-this is….
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

Question: 57
(Choose 1 answer)
The ethical principle that dictates that an act is ethical when a majority of people in society agrees
with it is referred to as….
A. Moral rules
B. Utilization
C. Social contract
D. None of the others

Question: 58
(Choose 1 answer)
……who create algorithms to break existing internet networks so as to solve the loopholes in them
A. Black Hat Hacker
B. Grey Hat Hacker
C. White Hat Hacker
D. Blue Hat Hacker

Question: 59
(Choose 1 answer)
In a stream cipher encryption and decryption are done one symbol. We have a plaintext stream a
ciphertext stream and a …..
A. Key block
B. Single key
C. Key stream
D. Auto key

Question: 60
(Choose 1 answer)
The RSA algorithm for confidentiality uses….. cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition

ĐÁP ÁN

1. C. High-level programming languages


2. A. Pascaline
3. C. Execute phase
4. A. Volatile
5. D. Error detection
6. C. Micro computer
7. B. Binary codes
8. B. Series of 1s and 0s
9. B. (C)16
10. C. 3
11. C. AA17
12. C. 11100111
13. C. 0100 1010
14. C. B×S
15. A. Bitmap
16. B. 1100 1100
17. C. 0011 0000
18. C. Star
19. A. Five
20. D. 8-Hexadecimal digits
21. A. TCP
22. C. Hybrid network
23. B. Static memory
24. C. EPROM
25. C. Main memory
26. C. Process
27. D. Waiting state
28. D. Algorithm
29. A. Pseudocode
30. C. Recursion
31. A. Selection
32. B. Source program
33. D. All of the others
34. D. Object-oriented paradigm
35. A. Variables
36. C. Use-case diagram
37. A. Analysis
38. B. Cohesion
39. B. Interoperability
40. D. Both black-box and glass-box
41. D. An array, a record, or a linked list
42. B. Record
43. A. The first
44. A. Data structure and operations
45. C. Subtree
46. D. Insert/rear
47. B. Binary file
48. D. Error report
49. A. Collision
50. C. Cell
51. A. Graph
52. A. An attribute
53. A. Insert
54. D. Normalization
55. A. Masquerading
56. C. Encryption
57. C. Social contract
58. C. White Hat Hacker
59. C. Key stream
60. A. Asymmetric-key

You might also like