Computer Science class Quiz multiplechoice
1.An AND gate is true if:
There is no such thing as an AND gate
Only one input is true
Both inputs are true
Neither input is true
2.An OR gate is true if
Only one input is true
There is no such thing as an OR gate
Either input is true
Both inputs are true
3.A NOT gate is false
A NOT gate does not exist
If the input is true
If there is no input
If the input is false
4.Which of these is not normally associated with the functions of a kernel?
Memory Manager
Device Drivers
File Manager
GUI
5.May create the illusion that the machine has
more memory than it actually does by playing a “shell game” in which blocks of data are shifted back and
forth between main memory and mass storage describes which of the following?
Memory Management Device
Virtual Memory
Memory Manager
The Kernel
6.Which of the following is a requirement for proper implementation of a critical region
Memory Manager
Dispatcher
GUI
Mutual Exclusion
7.An algorithm is an __________ set of unambiguous, executable steps that defines a terminating process.
ordered
small
unordered
large
8.Which of the following is NOT a network topology classification?
Star
Ethernet
Bus
Ring
9.Possession of token provides right to introduce new message in which of the following network topologys?
Token Ring
Token Bus
Bus
Star
10.CSMA/CD, in which a silent bus provides right to introduce new message, is used within:
Star Ring
Token Ring
Ethernet
Virtual Bus Connection
11.A bridge ____________
Connects many networks together
Connects two incompatible networks
Connects two compatible networks
Is the backbone of the internet
12.A byte is 16 bits.
True
False
13. Sounds are represented by bit patterns within a computer.
True
False
14.In order for an exclusive or to be true, both inputs must be true.
True
False
15. Gates provide the building blocks from which computers are constructed.
True
False
16. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 0
1 0 0
1 1 1
XOR
AND
OR
Answer not present
NOT
17. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 1
1 0 1
1 1 0
OR
AND
XOR
Answer not present
NOT
18. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 1
1 0 1
1 1 1
XOR
NOT
AND
OR
Answer not present
19. The following truth table describes an _____________ gate.
X Y Output
0 0 0
0 1 0
1 0 0
1 1 1
Answer not present
OR
NOT
AND
XOR
20. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 1
1 0 1
1 1 0
NAND
EQV
Answer not present
NOR
XOR
21. The following truth table describes an _____________ gate.
X Y Output
0 0 1
0 1 0
1 0 0
1 1 0
XOR
Answer not present
EQV
NOR
NAND
22. A flip-flop is a circuit that can store many bits.
True
False
23.Memory addresses are not unique.
True
False
24.RAM stands for
Real Allocated Memory
Random Access Memories
Random Access Memory
Random Alert Memory
25.DRAM is composed of
ROM
Answer not present
non-volatile RAM
volatile RAM
26.A megabyte is closed to 10 to the power of _____
20
30
Answer not present
10
27.2 raised to the 30th power is a ______________
Answer not present
Megabyte
Kilobyte
Gigabyte
28.Which of the following is NOT a mass storage device
CD/DVD
Flash drive
Disk drive
ROM
29.Data is stored on a CD in _________
a single spiraling track
tracks and sectors
Multiple tracks
Answer not present
30.Which of the following encoding methods uses 21 bits to encode characters
ASCII
ISO
Unicode
Answer not present
31.When you cannot store an number accurately, ___________ occurs
Truncation
Underflow
Overflow
Answer not present
32.When a number is too small to represent in a computer, ___________ occurs
Underflow
Answer not present
Truncation
Overflow
33.In Excess 4, -1 is represented by ____________
011
100
101
111
34.In Two’s Compliment, -5 in 8 bits would be
11111010
00000101
11111011
Answer not present
35.In floating point, the exponent is stored in ___________ notation
Excess
Answer not present
Binary
Two’s Compliment
36.7 3/4 can be accurately represented in 8 bits, where three bits are used for the exponent, one bit for the sign, and four for the mantissa.
True
False
37. Parity can correct any number of errors in a transmission.
True
False
38. Which of the following is not a compression method for pictures?
Answer not present
MPEG
TIFF
GIFF
BMP
39.An algorithm is an ordered set of __________, executable steps that define a terminating process
ambiguous
unambiguous
Answer not present
well defined
40. Polya’s Problem Solving Steps, in order, are:
1. Understand the problem
2. __________________
3. Carry out the plan
4. Evaluate the plan for accuracy and its potential as a tool for solving other problems.
Review the plan
Contract some to do the plan
Answer not present
Carry out the plan
41.Iterative structures with a programming language are used to check if something is true or false.
True
False
42. A ___________ loop tests after a loop has done at least one iteration
Post-test
Answer not present
Unconditional
Pre-test
43.Computing a factorial can be done recursively or iteratively.
True
False
44.When evaluating an algorithm’s efficiency, Computer Scientists look at the _____, average, and worst cases
random
last
first
Answer not present
best
45. Algorithm efficiency is represented in Big Omega notation
True
False
46.Which of the following is not considered a scope of a network
MAN
LAN
WAN
PAN
NAN
47. CSMA/CD is used in ___________
Answer not present
token ring
WiFi
ethernet
48.The “hidden terminal problem” occurs in ________ networks
Token ring
ethernet
Bus
WiFi
49. Which of the following connects two compatible networks
Router
Switch
Bridge
Repeater
50.Which of the following extends a network
Switch
Router
Repeater
Bridge
51.Which of the following is used to create a “star” network
Repeater
Router
Bridge
Switch
52.In peer-to-peer communications, one of the communicators is “in charge”
True
False
53.The server initiates contact in a client-server arrangement.
True
False
54.The internet was created by _________________
DARPA
The uUniversity of California
Answer not present
The private sector
Private universities
55.Which of the following tiers would your ISP be?
4
2
1
3
56.IP addresses can be either 32 or ________ bits in length
256
128
16
64
57.DNS stands for:
Domain Numbering System
Domain Name Server
Digital Name Server
Domain Numbered System
58.ICANN oversees the registration of domain names.
True
False
59.SMTP is used to check your email.
True
False
60.TCP is used for streaming of videos.
True
False
61.All two letter “top level” domains are country codes.
True
False
62.Javascript is a server-side application.
True
False
63.CGI’s execute in your browser.
True
False
64.The Internet Software Layers described in your textbook are:
________________
Transport
Network
Link
User-interface
Program
Alliance
Application
Answer not present
65.The _______ layer handles the actual transmission of packets
Application
Transport
Network
Link
66.The ___________ layer handles routing through the Internet
Network
Link
Application
Transport
67.The _________ layer chops messages into packets.
Network
Application
Link
Transport
68.TCP and UDP are part of the ______________ layer
Link
Application
Transport
Network
69.UDP is more reliable than TCP
True
False
70.The memory manager uses the hard drive to create the illusion of having more memory.
True
False
71.The illusion of having more memory than what is actually installed is called virtual memory.
True
False
72.The boot loader is in RAM
True
False
73.The boot loader is run when the power is first turned on.
True
False
74. The dispatcher adds new processes to the process table and removes from the process table
True
False
75. The scheduler controls the allocation of time slices to the processes in the process table.
True
False
76.A critical region is a group of instructions that should be executed by only one process at a time
True
False
77.Mutual exclusion is not required for critical regions.
True
False
78.A semaphore is used to signal the availability of a resource
True
False
79.Deadlock occurs when processes block each other from using resources.
True
False
80.Conditions required for deadlock do not include competition for shared resources.
True
False
81.Passwords cannot be hacked.
True
False
82.A traffic signal is an example of a ______________
Semaphore
Mutual exclusion
Critical region
Answer not present
83.In order for traffic to flow correctly, a traffic signal, via its semaphoric actions, controls acces to a ______________
Answer not present
Mutual exclusion
Critical region
Unshared resource
84.Algorithm representation does not require a set of well-define primitives.
True
False
85.Assignment is an example of a pseudo-code primitive.
True
False
86. If the if conditional is false, then the program will always stop.
True
False
87.Registers are part of main memory
True
False
88.When a processor has a set of a few, simple, efficient and fast instructions, we call this processor a ______________
DISC
RSIC
Answer not present
CISC
RISC
89.A CISC process has many convenient and powerful instructions
True
False
90.Machine instructions can be classified into the categorical types of Data Transfer, Mathematics, and Control
True
False
91.The op-code specifies what instruction to execute.
True
False
92.The Machine Cycle consists of the Fetch, Decode, and Execute phases.
True
False
93.Shifting and rotating are the exact same thing — just two different names for performing the same function.
True
False
94.Shifting two bits to the right is the same as multiplying by four.
True
False
95.The Von Neumann Bottleneck occurs when there is sufficient bus speed to handle the amount of data that needs to be moved.
True
False
96.When bits are moved across a single communication path, one by one, we call this __________ communication
Parallel
Serial
Answer not present
Inefficient
97.Which of the following is not a form of parallel processing
SISD
Answer not present
SIMD
MIMD
MISD
MISD
98.Pipelining overlaps steps of the machine cycle.
True
False
99.A controller is an intermediary aparatus which handles communication between a device and the CPU
True
False
100.In memory-mapped I/O, the CPU communicates with devices as if they were locations in main memory.
True
False