Key FE Flashcards

(301 cards)

1
Q

The ________ model is the basis for today’s computers.

A

von Neumann

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a computer, the ________ subsystem stores data and programs.

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a computer, the ________ subsystem performs calculations and
logical operations.

A

ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a computer, the ________ subsystem accepts data and programs and
sends processing results to output devices.

A

input/output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a computer, the ________ subsystem serves as a manager of the
other subsystems.

A

control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to the von Neumann model, ________ are stored in memory.

A

data and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A step-by-step solution to a problem is called ________

A

an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FORTRAN and COBOL are examples of ________ .

A

computer languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A 17th-century computing machine that could perform addition and
subtraction was the ________

A

Pascaline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ is a set of instructions in a computer language that tells the
computer what to do with data.

A

A program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ is the design and writing of a program in structured form.

A

Software engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first electronic special-purpose computer was called ________

A

ABC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the first computers based on the von Neumann model was called ________ .

A

EDVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first computing machine to use the idea of storage and
programming was called ________ .

A

the Jacquard loom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ separated the programming task from computer operation tasks.

A

High-level programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The base of the decimal number system is ________

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The base of the binary number system is ________ .

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The base of the octal number system is ________ .

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The base of the hexadecimal number system is ________ .

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When converting a decimal integer to base b, we repeatedly _______

A

. divide by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When converting a decimal fraction to base b, we repeatedly ________

A

multiply by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a set of 64 symbols, each symbol requires a bit pattern length of
________ bits.

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many symbols can be represented by a bit pattern with ten bits?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

f the ASCII code for E is 1000101, then the ASCII code for e is
________ . Answer the question without consulting the ASCII table.

A

1100101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A 32-bit code called ________ represents symbols in all languages.
Unicode
26
An image can be represented in a computer using the ________ method.
either bitmap or vector graphic
27
In the ________ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.
bitmap
28
In the ________ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.
vector
29
In the ________ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
bitmap
30
When we want to store music in a computer, the audio signal must be ________ .
sampled, quantized, and coded
31
A floating-point value after normalization is (1.0101) ? 2?4. What is the value of exponent section in the Excess-127 representation?
123
32
Assume a new Excess system uses 17 bits to represent the exponent section. What is the bias value in this system?
65535
33
Which number representation method is often used to store the exponential value of a fractional part?
Excess
34
In an Excess conversion, we ________ the number to be converted.
add the bias number to
35
When a fractional part is normalized, the computer stores the ________
the sign, exponent, and mantissa
36
The combination of sign and mantissa of a real number in IEEE standard floating point format is stored as an integer in the ________ representation.
sign-and-magnitude
37
________ is an arithmetic operation.
Subtraction
38
________ is a logical bit operator.
exclusive OR, unary NOT, or binary AND
39
The ________ method of integer representation is the most common method for storing integers in computer memory.
two's complement
40
In two's complement addition, if there is a final carry after the left most column addition, ________ .
discard it
41
For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is ________
-128
42
For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is ________
127
43
In two's complement representation with a 4-bit allocation, we get ________ when we add 1 to 7.
-8
44
In two's complement representation with a 4-bit allocation, we get ________ when we add 5 to 5.
-6
45
If the exponent in Excess_127 is binary 10000101, the exponent in decimal is ________ .
6
46
If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the smaller number ________ .
two places to the left
47
________ operator (s) takes two inputs to produce one output.
AND, OR, or XOR
48
The unary ________ operator inverts its single input.
NOT
49
________ operator (s), if the input is two 0s, the output is 0.
In AND, OR, or XOR
50
________ operator (s), if the input is two 1s, the output is 0.
In only XOR
51
For the binary AND operation, only an input of ________ gives an output of 1.
two 1s
52
For the binary OR operation, only an input of ________ gives an output of 0.
two 0s
53
We use a bit pattern called a ________ to modify another bit pattern.
mask
54
To flip all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.
XOR
55
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then ________ the bit pattern and the mask.
AND
56
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then ________ the bit pattern and the mask.
OR
57
The ________ is a computer subsystem that performs operations on data.
CPU
58
________ is a stand-alone storage location that holds data temporarily.
A register
59
________ is a unit that can add two inputs.
An ALU
60
A register in a CPU can hold ________ .
data, instruction, or program counter values
61
A control unit with five wires can define up to ________ operations.
32
62
A word can be ________ bits.
8, or 16, or 32
63
If the memory address space is 16 MB and the word size is 8 bits, then________ bits are needed to access each word.
24
64
The data in ________ is erased if the computer is powered down.
RAM
65
________ is a memory type with capacitors that need to be refreshed periodically.
DRAM
66
________ is a memory type with traditional flip-flop gates to hold data.
SRAM
67
There are ________ bytes in 16 Terabytes.
2^16
68
________ can be programmed and erased using electronic impulses but can remain in a computer during erasure.
EEPROM
69
________ is a type of memory in which the user, not the manufacturer, stores programs that cannot be overwritten.
PROM
70
Main memory in a computer usually consists of large amounts of________ speed memory.
low
71
A ________ is a storage device to which the user can write information only once.
CD-R
72
A ________ is a storage device that can undergo multiple writes and erasures.
CD-RW
73
The smallest storage area on a magnetic disk that can be accessed at one time is a ________ .
sector
74
If the memory has 232 words, the address bus needs to have ________ wires.
32
75
A control bus with eight wires can define ________ operations.
256
76
A ________ controller is a high-speed serial interface that transfers data in packets.
USB and FireWire
77
The three steps in the running of a program on a computer are performed in the specific order ________ .
fetch, decode, and execute
78
In the ________ method for synchronizing the operation of the CPU with an I/O device, the CPU is idle until the I/O operation is finished.
programmed I/O
79
In the ________ method for synchronizing the operation of the CPU with an I/O device, a large block of data can be passed from an I/O device to memory directly.
DMA
80
The TCP/IP model has ________ layers.
5
81
The ________ layer of the TCP/IP protocol suite provides services for end users.
application
82
The ________ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
physical
83
The ________ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
data-link
84
The ________ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
network
85
What is the domain name in the email address kayla@nasa.gov?
nasa.gov
86
Which physical topology uses a hub or switch?
star
87
IP addresses are currently ________ bits in length.
32
88
________ protocol (s) is one of the protocols in the transport layer.
TCP, UDP, and SCTP
89
________ is a protocol for email services.
SMTP
90
________ is a protocol for file transfer.
FTP
91
________ is a protocol for accessing and transferring documents on the WWW.
HTTP
92
________ is a program that facilitates the execution of other programs.
An operating system
93
________ supervises the activity of each component in a computer system.
An operating system
94
________ is multi-programming with swapping.
Demand paging
95
________ is multi-programming without swapping.
Partitioning
96
In ________ , only one program can reside in memory for execution.
mono-programming
97
________ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.
Partitioning
98
In paging, a program is divided into equally sized sections called________ .
pages
99
In ________ , the program can be divided into differently sized sections.
demand segmentation
100
In ________ , the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.
demand paging
101
A process in the ________ state can go to either the ready, terminated, or waiting states.
running
102
A process in the ready state goes to the running state when ________ .
it gets access to the CPU
103
A program becomes a ________ when it is selected by the operating system and brought to the hold state.
job
104
Every process is ________ .
a job and a program
105
The ________ scheduler creates a process from a job and changes a process back to a job.
job
106
The ________ scheduler moves a process from one process state to another.
process
107
To prevent ________ , an operating system can put resource restrictions on processes.
deadlock
108
________ can occur if a process has too many resource restrictions.
Starvation
109
The ________ manager is responsible for archiving and backup.
file
110
The ________ manager is responsible for access to I/O devices.
device
111
________ is a step-by-step method for solving a problem or doing a task.
An algorithm
112
There are ________ basic constructs in computer -science.
three
113
The ________ construct tests a condition.
decision
114
The ________ construct uses a set of actions one after another.
sequence
115
The ________ construct handles repeated actions.
repetition
116
________ is a pictorial representation of an algorithm.
A UML diagram
117
________ is an English-language-like representation of code.
Pseudocode
118
________ is a basic algorithm that adds a list of numbers.
Summation
119
________ is a basic algorithm that multiplies a list of numbers.
Product
120
________ is a basic algorithm that arranges data according to its value.
Sorting
121
The items are divided into two lists (sorted and unsorted) ________ sort.
in selection, bubble, or insertion
122
In ________ sort, the item that goes into the sorted list is always the first item in the unsorted list.
insertion
123
In ________ sort, the smallest item from the unsorted list is swapped with the item at the beginning of the unsorted list.
selection
124
In ________ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
bubble
125
________ is a basic algorithm in which we want to find the location of a target in a list of items.
Searching
126
We use a ________ search for an unordered list.
sequential
127
We use a ________ search for an ordered list.
binary
128
________ is a process in which an algorithm calls itself.
Recursion
129
The only language understood by computer hardware is a ________ language.
machine
130
C, C++, and Java can be classified as ________ languages.
high-level
131
FORTRAN is a(n) ________ language.
procedural
132
Pascal is a(n) ________ language.
procedural
133
Java is a(n) ________ language.
object-oriented
134
LISP is a(n) ________ language.
functional
135
________ is a common language in the business -environment.
COBOL
136
________ is a popular object-oriented language.
Java
137
A ________ program can be either an application or an applet.
Java
138
LISP and Scheme are both ________ languages.
functional
139
Prolog is an example of a(n) ________ language.
declarative
140
One phase in system development is ________
analysis
141
Defining the users, requirements, and methods is part of the ________phase.
analysis
142
In the system development process, writing the program is part of the________ phase.
implementation
143
In the system development process, structure charts are tools used in the ________ phase.
design
144
Testing a software system can involve ________ testing.
both black-box and glass-box
145
________ is the breaking up of a large project into smaller parts.
Modularization
146
________ is a measure of how tightly two modules are bound to each other.
Coupling
147
________ between modules in a software system must be minimized.
Coupling
148
________ between modules in a software system must be maximized.
Cohesion
149
A data structure can be ________ .
an array, a record, or a linked list
150
An array that consists of just rows and columns is a ________ array.
two-dimensional
151
Each element in a record is called ________ .
a field
152
All the members of a record must be ________
related types
153
________ is an ordered collection of data in which each element contains the location of the next element.
A linked list
154
In a linked list, each element contains ________
data and a link
155
The ________ is a pointer that identifies the next element in the linked list.
link
156
Given a linked list called children, the pointer variable children identifies ________ element of the linked list.
the first
157
An empty linked list consists of ________
a null head pointer
158
To traverse a list, you need a ________ pointer.
walking
159
In an abstract data type, ________ .
the ADT implementation is hidden
160
A stack is a ________ structure.
LIFO
161
A (n) ________ list is also known as a queue.
FIFO
162
If A is the first data element input into a stack, followed by B, C, and D, then ________ is the first element to be removed.
D
163
If A is the first data element input into a queue, followed by B, C, and D, then ________ is the first element to be removed
A
164
The pop operation ________ of the stack.
deletes an item from the top
165
The push operation ________ of the stack.
inserts an item at the top
166
In a binary tree, each node has ________ two subtrees.
at most
167
In preorder traversal of a binary tree, the ________
root is processed first
168
In ________ traversal of a binary tree, the right subtree is processed
inorder
169
In postorder traversal of a binary tree, the root is processed ________
last
170
In postorder traversal of a binary tree, the left subtree is processed________ .
first
171
In ________ traversal of a binary tree, the left subtree is processed last.
preorder
172
In an inorder traversal of a binary tree, the root is processed ________.
second
173
________ file can be accessed randomly.
Any
174
________ file can be accessed sequentially.
A sequential
175
When a sequential file is updated, the ________ file gets the actual update.
new master
176
When a sequential file is updated, the ________ file contains a list of all errors occurring during the update process.
error report
177
When a sequential file is updated, the ________ file contains the changes to be applied
transaction
178
After a sequential file is updated, the ________ file contains the most current data.
new master
179
If the transaction file key is 20 and the first master file key is 25, then we ________ .
add the new record to the new master file
180
If the transaction file key is 20 with a delete code and the master file key is 20, then we ________ .
delete the data
181
An indexed file consists of ________
an index and random data file
182
The index of an indexed file has ________ fields.
two
183
In the ________ hashing method, selected digits are extracted from the key and used as the address.
digit extraction
184
In the ________ hashing method, the key is divided by the file size, and the address is the remainder plus 1.
modulo division
185
In the ________ hashing method, there are no synonyms or collisions.
direct
186
________ are keys that hash to the same location in the data file.
Synonyms
187
When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a ________ .
collision
188
The address produced by a hashing algorithm is the ________ address.
home
189
The ________ area is the file area that contains all the home addresses.
prime
190
In the ________ collision resolution method, we try to put data that cannot be placed in location 123 into location 124.
open addressing
191
In a three-level DBMS architecture, the layer that interacts directly with the hardware is the________ level.
internal
192
In a three-level DBMS architecture, the ________ level determines where data is actually stored on the storage devices.
internal
193
The ________ level of a three-level DBMS architecture defines the logical view of the data.
conceptual
194
The data model and the schema of a DBMS are often defined at the ________ level.
conceptual
195
In a three-level DBMS architecture, the ________ level interacts directly with the users.
external
196
Of the various database models, the ________ model is the most prevalent today.
relational
197
Each column in a relation is called ________ .
an attribute
198
Each row in a relation is called ________
a tuple
199
A unary operator is applied to ________ relation(s) and creates an output of ________ relation(s).
one, two
200
A binary operator is applied to ________ relation(s) and creates an output of ________ relation(s).
two, one
201
The unary ________ operation always results in a relation that has exactly one more row than the original relation.
insert
202
If you want to change the value of an attribute of a tuple, you use the ________ operation.
update
203
The operation that takes two relations and combines them based on common attributes is the ________ operation.
join
204
If you need to delete an attribute in a relation, you can use the ________ operation.
project
205
You want to create a relation called New that contains tuples that belong to both relation A and relation B. For this, you can use the ________ operation.
intersection
206
Which of the following is a unary operator?
Project
207
Which of the following is a binary operator?
difference
208
________ is a declarative language used on relational databases.
SQL
209
Data is compressed using a dictionary with indexes to strings. This is ________ .
Lempel Ziv encoding
210
A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ________ .
run-length encoding
211
In a ________ data compression method, the received data is an exact copy of the original message.
lossless
212
________ data compression method, the received data need not be an exact copy of the original message.
In MP3, JPEG, or MPEG
213
________ is an example of lossy compression.
JPEG
214
________ encoding is a lossless data compression method.
Huffman, run-length, or LZ
215
In ________ encoding, the more frequently occurring characters have shorter codes than the less frequently occurring characters.
Huffman
216
In ________ encoding, PPPPPPPPPPPPPPP can be replaced by P15.
run-length
217
LZ encoding requires ________ .
a dictionary, a buffer, and an algorithm
218
JPEG encoding involves ________ , a process that reveals the redundancies in a block.
the discrete cosine transform
219
In JPEG encoding, the ________ process breaks the original picture into smaller blocks and assigns a value to each pixel in a block.
blocking
220
The last step in JPEG, ________ , removes redundancies.
compression
221
________ is a lossy compression method for pictures and graphics, whereas ________ is a lossy compression method for video.
JPEG, MPEG
222
Which of the following is OSI layer of repeater? Data Link Network Physical Transport
Physical
223
An OS method of allowing multiple processes to share the CPU is: * 1/1 Time slicing Multiuser Multi Access Multi purpose
Time slicing
224
Before a disk can be used, it must be: * 1/1 Erased and set up Partitioned and formatted Deleted and formatted Erased and formatted
Partitioned and formatted
225
Which of the OSI layers is responsible for guaranteed delivery of data? * 1/1 Transport Network Data Link Presentation
Data Link
226
The purpose of HTTP is to * 0/1 Format Web pages Transfer Web pages Transfer address Transfer data
Transfer Web pages
227
In Windows , you can see the Task manager by using which of the following? * 1/1 Tab +Alt +Del key Shift +Alt +Del key Ctrl+Alt +Del key Fn +Alt +Del key
Ctrl+Alt +Del key
228
Which type of guided medium is the least susceptible to attenuation and inductance? * 0/1 Coaxial cable Copper wire Fiber-optic cable Golden wire
Fiber-optic cable
229
What is the positional value of the 7 in the base 8 number 2715? * 1/1 16 8 64 100
64
230
Which of the following is not one of the basic Boolean operators? * 1/1 AND . OR NOT XOR
XOR
231
Which of the following is OSI layer of Router * 1/1 Data Link Network Physical Transport
Network
232
DOS stands for: * 1/1 Demand Open Sources Disk Operating System Device Outer Shell Direct Operating System
Disk Operating System
233
Which of the following is not a multitasking OS? * 1/1 Linux UNIX Windows DOS
DOS
234
The process of arranges the disk's surface into addressable areas and sets up the disk's basic directory tree structure * 1/1 Partitioning Set up Booting Formatting
Formatting
235
What binary value is equivalent to the hex number C43A? * 1/1 1100100100010110 1100110101111010 1100010000111010 1100001101011101
1100010000111010
236
Which part of the CPU is responsible for mathematical operations? * 1/1 CU ALU RLU VLSI
ALU
237
What features of transistors made them superior for computers, compared with vacuum tubes? * 1/1 They were more expensive than tubes but lasted longer and were cooler in temperature. They didn't last as long as tubes but were less expensive. They were cheaper and smaller than tubes. They were cheaper, smaller, and cooler than tubes and lasted longer.
They were cheaper, smaller, and cooler than tubes and lasted longer.
238
Today, Microsoft considers its major competition in operating systems to be what system? * 0/1 Control Data Corporation OS Sega Games operating system Linux operating system Mac OS X
Linux operating system
239
Linux operating system High-speed __________________ is used to speed processing in a computer system * 0/1 Mass storage Cache memory ROM
Cache memory
240
Which of the following circuit types is used to create SRAM? * 1/1 Decoder Flip-flop LCD ROM
Flip-flop
241
DSL speeds range from: * 1/1 256 Kbps to 1.5 Mbps 256 Mbps to 15 Mbps 56 Kbps to 256 Kbps 100 Kbps to 156 Kbps
256 Kbps to 1.5 Mbps
242
DSL is a combination of what two types of multiplexing? * 1/1 AM and FM FDM and FM AM and TDM FDM and TDM
FDM and TDM
243
What is the binary equivalent of the decimal number 543? * 1/1 11111011110111 101100111 1011010011 1000011111
1000011111
244
A _______________ in computer terminology is a set of wires and protocols designed to facilitate data transfer * 1/1 Gate Bus Boolean circuit CPU
Bus
245
Which of the following is not one of the OSI model layers? * 1/1 Data link Wireless Transport Application
Wireless
246
The main level of a disk is called the: * 1/1 Root Platform Sector Directory
Root
247
Internet Providers maintain a Switching center called a: * 0/1 End user Internet Point of Presence Access point
Point of Presence
248
What is the positional value of the A in the hexadecimal number C4A6? * 1/1 10 16 160 100
16
249
What base 10 value is equivalent to 3C0D of base 16? * 1/1 32,767 15,373 68,536 10,125
15,373
250
Which topology has become more popular with the advent of the Internet and home networking? * 1/1 Token ring Star Bus Ring
Star
251
Which type of memory can't be written to easily? * RAM SRAM ROM Flip-flop
ROM
252
Which type of I/O processing is most efficient? * 0/1 Boolean Polling Logic Interrupt
Interrupt
253
What numeric value in base 10 does the binary number 10000001 represent? * 1/1 119 139 129 None of the above
129
254
Which of the following is OSI layer of Switch? * 1/1 Data Link Network Physical Transport
Data Link
255
What numeric value in hexadecimal is equivalent to the binary number 1101111010101101 * 1/1 BCAF BE6C 6FAD DEAD
DEAD
256
Which of the following standards is used in wireless networking? * 1/1 802.15 OSI 802.11 TCP
802.11
257
Which of the following memory types is the fastest? * 1/1 DRAM ROM XOR SRAM
SRAM
258
What is the minimum number of bits required to represent 256 colors? * 0/1 4 8 16 32
16
259
Boolean expressions are simplified through the use of: * 0/1 Basic identities Gate logic Algebraic expressions Specialized circuits
Algebraic expressions
260
The _______________ contains instructions and data that provide the startup program for a computer. * 1/1 RAM DRAM BIOS CPU
BIOS
261
In Windows, the MD command must be used to create a folder * 1/1 True False
False
262
Which of the following translates a program's statements, one by one, into a language the computer can understand? * 1/1 Compiler Interpreter Translator IDE
Interpreter
263
Which Internet component is responsible for decrementing the TTL field? * 1/1 Router Switch DNS Gate way
Router
264
Which HTML tag is used to provide links to other pages? * 1/1

265
Which of the following converts source code into a computer language and results in an executable file * 1/1 Interpreter Compiler IDE Translator
Compiler
266
Which of the following is not a responsibility of the file system? * 1/1 Creating files Manipulating files Renaming files None of the above
None of the above
267
A ... is a standard or typical example of how something might work, but without all the built-in functionality. * 1/1 Flowchart Prototype Design document Data dictionary
Prototype
268
Which of the following protocols makes the Web possible? * 1/1 FTP Telnet HTTP IP
HTTP
269
Which portion of the TCP/IP protocol suite provides error detection and correction * 1/1 TCP IP Both Neither
TCP
270
Which is not included as a task of software engineering? * 1/1 Communicating with clients in meetings Designing screens Writing the application Creating a design document None of the above
None of the above
271
Which is not a type of control structure? * 1/1 Invocation Top down Algorithm Selection
Algorithm
272
How many DNS servers does the Internet have? * 1/1 256 512 Thousands Millions
Thousands
273
What is the set of possible values for a column? * 1/1 Index Table SQL Domain
Domain
274
First normal DB form say * 1/1 No non key columns depend on another nonkey column Every column that's not part of the primary key is fully dependent on the primary key. Eliminate repeated fields All of the above
Eliminate repeated fields
275
Which of the following is not a valid DBMS? * 1/1 SQL Server C++ Oracle DB2
C++
276
Which is not a valid software development model? * 1/1 Waterfall Degradation Evolution Spiral Incremental
Degradation
277
A....... is a bot that actively reproduces itself across a network * 1/1 Virus Trojan Worm None of the above
Worm
278
Use ...................................to protect everything Startup, e-mail, router, phone, PDA, screen saver * 1/1 Back up passwords locks keys
passwords
279
Which of the following is not an Internet-related protocol? * 1/1 HTTP HTML FTP TCP
HTML
280
.............. are uninvited guest programs on your computer with the potential to damage files and the operating system * 1/1 Virus Worm Bot Troyjan
Virus
281
Which is not an advantage of using NTFS? * 1/1 Journaling File encryption Efficient disk use on small volumes Security
Efficient disk use on small volumes
282
What uniquely identifies a row in a table? * 1/1 Index Field Primary key Tuple
Primary key
283
How many IP addresses are presented to the Internet when NAT is used? * 1/1 1 16 3 64
1
284
How many possible ports are allowed in TCP? * 1/1 8 16 65,536 16,137,285
65,536
285
What is the standard port number for HTTP? * 1/1 16 32 64 80
80
286
A(n) __________ is a data structure consisting of contiguous memory locations * 1/1 Queue Stack Array Tree
Array
287
A ... is used as a visual model for describing a program's logical steps * 1/1 Class diagram Flowchart Use case diagram Design document
Flowchart
288
Which Internet protocol is used to assign IP addresses dynamically? * 1/1 TCP DHCP HTTP DNS
DHCP
289
Which of the following SQL SELECT options is used to organize the data being returned? * 1/1 SORT BY ORDER BY WHERE ARRANGE
ORDER BY
290
With _________ the microchip is organized so that a section of memory cells are erased in a single action. * 1/1 ROM Flash PROM EEPROM
Flash
291
Which should not be included in the design document? * 1/1 Project objectives and requirements Cost analysis Feasibility study Copies of screens and reports None of the above
None of the above
292
Which is not an example of a high-level programming language? * 1/1 Ada Assembly C++ Java
Assembly
293
A design document is used as: * 1/1 A way to bill the client more A blueprint that shows an application's functionality A replacement for pseudocode when writing a program None of the above
A blueprint that shows an application's functionality
294
Which of the following converts source code into a computer language and results in an executable file? * 1/1 Interpreter Compiler Translator IDE
Compiler
295
Which is not a step of the database design process? * 1/1 Create the tables Create the relationships Investigate Add the data
Add the data
296
Disk Defragmenter utility is used to * 1/1 reorganize tracks minimize drive head movement? minimize files reorganize sector
minimize drive head movement?
297
What is a name used to identify a specific location and value in memory? * 1/1 Variable Operator Control structure Object
Variable
298
The document responsible for describing the type of data stored in the database is called the * 1/1 Design document Data dictionary UML diagram SDLC
Data dictionary
299
is a program that poses as an innocent program * 1/1 Worm Bot Trojan Virus
Trojan
300
Which of the following is an example of a high-level protocol? * 1/1 TCP IP DHCP SMTP
SMTP
301
Which is not a type of programming language? * 1/1 Low-level Assembly High-level Machine None of the above
None of the above