Computer Science class Quiz multiplechoice

Computer Science class Quiz multiplechoice
1.An AND gate is true if:

There is no such thing as an AND gate

Only one input is true

Both inputs are true

Neither input is true

2.An OR gate is true if

Only one input is true

There is no such thing as an OR gate

Either input is true

Both inputs are true

3.A NOT gate is false

A NOT gate does not exist

If the input is true

If there is no input

If the input is false

4.Which of these is not normally associated with the functions of a kernel?

Memory Manager

Device Drivers

File Manager

GUI

5.May create the illusion that the machine has
more memory than it actually does by playing a “shell game” in which blocks of data are shifted back and
forth between main memory and mass storage describes which of the following?

Memory Management Device

Virtual Memory

Memory Manager

The Kernel

6.Which of the following is a requirement for proper implementation of a critical region

Memory Manager

Dispatcher

GUI

Mutual Exclusion

7.An algorithm is an __________ set of unambiguous, executable steps that defines a terminating process.

ordered

small

unordered

large

8.Which of the following is NOT a network topology classification?

Star

Ethernet

Bus

Ring

9.Possession of token provides right to introduce new message in which of the following network topologys?

Token Ring

Token Bus

Bus

Star

10.CSMA/CD, in which a silent bus provides right to introduce new message, is used within:

Star Ring

Token Ring

Ethernet

Virtual Bus Connection

11.A bridge ____________

Connects many networks together

Connects two incompatible networks

Connects two compatible networks

Is the backbone of the internet

12.A byte is 16 bits.

True

False
13. Sounds are represented by bit patterns within a computer.

True

False

14.In order for an exclusive or to be true, both inputs must be true.

True

False
15. Gates provide the building blocks from which computers are constructed.

True

False

16. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 0
1 0 0
1 1 1

XOR

AND

OR

Answer not present

NOT

17. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 1
1 0 1
1 1 0

OR

AND

XOR

Answer not present

NOT

18. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 1
1 0 1
1 1 1

XOR

NOT

AND

OR

Answer not present

19. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 0
1 0 0
1 1 1

Answer not present

OR

NOT

AND

XOR

20. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 1
1 0 1
1 1 0

NAND

EQV

Answer not present

NOR

XOR

21. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 0
1 0 0
1 1 0

XOR

Answer not present

EQV

NOR

NAND

22. A flip-flop is a circuit that can store many bits.

True

False

23.Memory addresses are not unique.

True

False

24.RAM stands for

Real Allocated Memory

Random Access Memories

Random Access Memory

Random Alert Memory

25.DRAM is composed of

ROM

Answer not present

non-volatile RAM

volatile RAM

26.A megabyte is closed to 10 to the power of _____

20

30

Answer not present

10

27.2 raised to the 30th power is a ______________

Answer not present

Megabyte

Kilobyte

Gigabyte

28.Which of the following is NOT a mass storage device

CD/DVD

Flash drive

Disk drive

ROM
29.Data is stored on a CD in _________

a single spiraling track

tracks and sectors

Multiple tracks

Answer not present

30.Which of the following encoding methods uses 21 bits to encode characters

ASCII

ISO

Unicode

Answer not present

31.When you cannot store an number accurately, ___________ occurs

Truncation

Underflow

Overflow

Answer not present

32.When a number is too small to represent in a computer, ___________ occurs

Underflow

Answer not present

Truncation

Overflow
33.In Excess 4, -1 is represented by ____________

011

100

101

111
34.In Two’s Compliment, -5 in 8 bits would be

11111010

00000101

11111011

Answer not present

35.In floating point, the exponent is stored in ___________ notation

Excess

Answer not present

Binary

Two’s Compliment

36.7 3/4 can be accurately represented in 8 bits, where three bits are used for the exponent, one bit for the sign, and four for the mantissa.

True

False

37. Parity can correct any number of errors in a transmission.

True

False

38. Which of the following is not a compression method for pictures?

Answer not present

MPEG

TIFF

GIFF

BMP
39.An algorithm is an ordered set of __________, executable steps that define a terminating process

ambiguous

unambiguous

Answer not present

well defined

40. Polya’s Problem Solving Steps, in order, are:

1. Understand the problem
2. __________________
3. Carry out the plan
4. Evaluate the plan for accuracy and its potential as a tool for solving other problems.

Review the plan

Contract some to do the plan

Answer not present

Carry out the plan

41.Iterative structures with a programming language are used to check if something is true or false.

True

False
42. A ___________ loop tests after a loop has done at least one iteration

Post-test

Answer not present

Unconditional

Pre-test

43.Computing a factorial can be done recursively or iteratively.

True

False

44.When evaluating an algorithm’s efficiency, Computer Scientists look at the _____, average, and worst cases

random

last

first

Answer not present

best

45. Algorithm efficiency is represented in Big Omega notation

True

False
46.Which of the following is not considered a scope of a network

MAN

LAN

WAN

PAN

NAN

47. CSMA/CD is used in ___________

Answer not present

token ring

WiFi

ethernet
48.The “hidden terminal problem” occurs in ________ networks

Token ring

ethernet

Bus

WiFi

49. Which of the following connects two compatible networks

Router

Switch

Bridge

Repeater

50.Which of the following extends a network

Switch

Router

Repeater

Bridge
51.Which of the following is used to create a “star” network

Repeater

Router

Bridge

Switch
52.In peer-to-peer communications, one of the communicators is “in charge”

True

False
53.The server initiates contact in a client-server arrangement.

True

False

54.The internet was created by _________________

DARPA

The uUniversity of California

Answer not present

The private sector

Private universities

55.Which of the following tiers would your ISP be?

4

2

1

3
56.IP addresses can be either 32 or ________ bits in length

256

128

16

64

57.DNS stands for:

Domain Numbering System

Domain Name Server

Digital Name Server

Domain Numbered System

58.ICANN oversees the registration of domain names.

True

False
59.SMTP is used to check your email.

True

False

60.TCP is used for streaming of videos.

True

False

61.All two letter “top level” domains are country codes.

True

False
62.Javascript is a server-side application.

True

False

63.CGI’s execute in your browser.

True

False
64.The Internet Software Layers described in your textbook are:
________________
Transport
Network
Link

User-interface

Program

Alliance

Application

Answer not present

65.The _______ layer handles the actual transmission of packets

Application

Transport

Network

Link
66.The ___________ layer handles routing through the Internet

Network

Link

Application

Transport

67.The _________ layer chops messages into packets.

Network

Application

Link

Transport
68.TCP and UDP are part of the ______________ layer

Link

Application

Transport

Network
69.UDP is more reliable than TCP

True

False
70.The memory manager uses the hard drive to create the illusion of having more memory.

True

False
71.The illusion of having more memory than what is actually installed is called virtual memory.

True

False
72.The boot loader is in RAM

True

False
73.The boot loader is run when the power is first turned on.

True

False
74. The dispatcher adds new processes to the process table and removes from the process table

True

False
75. The scheduler controls the allocation of time slices to the processes in the process table.

True

False

76.A critical region is a group of instructions that should be executed by only one process at a time

True

False
77.Mutual exclusion is not required for critical regions.

True

False
78.A semaphore is used to signal the availability of a resource

True

False
79.Deadlock occurs when processes block each other from using resources.

True

False

80.Conditions required for deadlock do not include competition for shared resources.

True

False
81.Passwords cannot be hacked.

True

False
82.A traffic signal is an example of a ______________

Semaphore

Mutual exclusion

Critical region

Answer not present

83.In order for traffic to flow correctly, a traffic signal, via its semaphoric actions, controls acces to a ______________

Answer not present

Mutual exclusion

Critical region

Unshared resource

84.Algorithm representation does not require a set of well-define primitives.

True

False

85.Assignment is an example of a pseudo-code primitive.

True

False
86. If the if conditional is false, then the program will always stop.

True

False

87.Registers are part of main memory

True

False

88.When a processor has a set of a few, simple, efficient and fast instructions, we call this processor a ______________

DISC

RSIC

Answer not present

CISC

RISC
89.A CISC process has many convenient and powerful instructions

True

False
90.Machine instructions can be classified into the categorical types of Data Transfer, Mathematics, and Control

True

False

91.The op-code specifies what instruction to execute.

True

False

92.The Machine Cycle consists of the Fetch, Decode, and Execute phases.

True

False

93.Shifting and rotating are the exact same thing — just two different names for performing the same function.

True

False

94.Shifting two bits to the right is the same as multiplying by four.

True

False

95.The Von Neumann Bottleneck occurs when there is sufficient bus speed to handle the amount of data that needs to be moved.

True

False

96.When bits are moved across a single communication path, one by one, we call this __________ communication

Parallel

Serial

Answer not present

Inefficient

97.Which of the following is not a form of parallel processing

SISD

Answer not present

SIMD

MIMD
MISD
MISD

98.Pipelining overlaps steps of the machine cycle.

True

False

99.A controller is an intermediary aparatus which handles communication between a device and the CPU

True

False

100.In memory-mapped I/O, the CPU communicates with devices as if they were locations in main memory.

True

False

Order from us and get better grades. We are the service you have been looking for.