Cis
The system administrator of a company would not be responsible for installing software on individual employee's computers.
F
You can store a number between 0 and 255 in 1 bit
F
you need 49 connections to connect 7 computers using a mesh topology.
F
Today's smart phones are more powerful computers than the earliest computers from the 1950s.
T
a computer at its lowest level consist of AND, OR, NOT, XOR circuits and storage locations.
T
to connect a group of computers and resources using a bus topology you need to use "T"
T
End User Layer
application
The binary addition 00001100 + 00101010 a. 00101010 b. 00110110 c. 01010101 d. 00111101
b. 00110110
Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T How many pages of the process given in the page table are currently in memory? a. 0 b. 4 c. 6 d. there is no way to tell
b. 4
The hexadecimal equivalent for the following binary number 1111111000101100 is a. FFC2 b. FE2C c. FD2C d. 7724
b. FE2C
Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T Where would you look for page# 1? a. Frame # 6 b. Frame # 4 c. Frame # 2 d. Page 1 is not in the memory
b. Frame # 4
If two processes are deadlocked, what is your best move to free them from deadlock? a. Kill all running processes b. Kill one of the processes c. Reboot all of the resources d. Wait until the deadlock resolves itself
b. Kill one of the processes
In streaming audio and video, which of ___________ protocol is preferred as it would trade off speed for assurance of arrival a. TCP b. UDP c. SSH d. HTTP
b. UDP
Which of the following provides a faster access time? a. Hard disk b. on-chip cache c. off-chip cache d. DRAM
b. on-chip cache
TCP/IP's network interface layer is roughly equivalent to the OSI model's a. physical layer b. physical and data link layers c. data link layer d. physical, data link and network layers combined
b. physical and data link layers
What is 11110000 XOR 10101010? a. 11110000 b. 10101010 c. 01011010 d. 10100000
c. 01011010
The following binary number 010011101 when converted to octal is a. 157 b. 234 c. 235 d. 471
c. 235
Which of the following is the largest storage capacity? a. 100 Megabytes b. 3,000,000 bytes c. 4 Gigabytes d. 1,000,000 bits
c. 4 Gigabytes
A type of network attack in which attacker modifies a switch's address table so that message intended for one machine go elsewhere a. Denial of service b. IP spoofing c. ARP poisoning d. SQL injection attack
c. ARP poisoning
Swap space is located where? a. DRAM b. SRAM c. Hard disk d. CPU
c. Hard disk
Volatility is a property of which of the following? a. Hard disk storage b. Processors c. Memory d. All of the above
c. Memory
When an updated version of software appears, if it is able to access and modify data files from older versions of the software, this is known as a. maintaining accessibility b. maintaining compatibility c. maintaining backward compatibility d. maintaining forward compatibility
c. maintaining backward compatibility
A security administrator would be responsible for administering which of the following? a. A web server b. A database server c. A web site d. A firewall
d. A firewall
Which of the following could be called a peripheral device? a. CPU b. memory c. registers d. printer
d. printer
Which of the following software is the only category that does not have any licensing requirements at all to obtain or use? a. commercial software b. freeware c. open source software d. public domain software
d. public domain software
Which of the following is not a form of input device? a. bar code reader b. MIDI device c. scanner d. speaker
d. speaker
Page Frame Valid 0 6 T 1 4 T 2 -- F 3 -- F 4 2 T 5 9 T If the CPU generates an address for page 3, what happens? a. the page is converted to frame 4 b. the page is converted to frame 6 c. the page is not converted d. the memory references causes a page fault
d. the memory references causes a page fault
IPOS stands for
input, processing, output, storage
If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this
promotes computer security
Page Frame Valid 0 6 T 1 -- F 2 -- F 3 -- F 4 2 T 5 9 T If the CPU generates an address for page 2, what happens?
the memory references causes a page fault
The operating system is software.
T
Which of the following denotes the proper order of 2 bits from smallest to largest?
00, 01, 10, 11
Convert the decimal value -160 into an 8-bit binary number.
01100000
What is 11110000 AND 10101010?
10100000
Convert the decimal value 150 into an 8-bit binary number.
128 + 16 + 4 + 2 = 10010110
The unsigned binary number 11000011 is equal to which decimal number?
195
Page Frame Valid 0 6 T 1 -- F 2 -- F 3 -- F 4 2 T 5 9 T How many pages of the process given in the page table are currently in memory?
3
The Octal Equivalent of 111110010110 is
7626
Pascal's mechanical calculator is considered the first programmable device to change its behavior
F
SRAM and DRAM are the same thing.
F
What is the difference between a conditional loop and a counting loop?
A conditional loop iterates while a condition is true, for instance, while(x>y), whereas a counting loop counts the number of iterations from some starting point to some ending point like 1 to 10 or 100 down to 1.
A topology, each device is connected to a common cable using "T" Connector
Bus
Rank these sizes from smallest to largest: Megabyte, Terabyte, Byte, Kilobyte, Gigabyte.
Byte, Kilobyte, Megabyte, Gigabyte, Terabyte
The decimal number 128 would be stored using 8-bit unsigned binary as a. 11111111 b. 01111111 c. 10000000 d. None of the above, there are not enough bits to store 128
C. 10000000
What is CSMA/CD? How does it work?
CSMA/CD is carrier sense multiple access with collision detection. First, the device listens to the network to see if it can sense a message. Then it attempts to place its message on the network. If this causes a collision, the device immediately cancels the message, indicates a "jam", and waits a random amount of time before trying again
An example of a programming language translator program is
Compiler
The binary number 110110110101 when converted to hexadecimal is
DB5
During the instruction fetch portion of the fetch-execute cycle, the program instruction is passed from memory to the CPU over the ______ bus.
Data
Physical Addressing
Data Link
Which of these IT roles would most need knowledge of such software as MySQL and Oracle?
Database administrator
Computer components operate on _______ signals.
Digital
The Hexadecimal equivalent of 1111100100111010 is
E93A
That idea that a resource should only be accessed by one process at a time and that no other process should access that resource until the previous process is completely finished with it is known as mutual________.
Exclusion
(T/ F) the kernel is a part of the operating system that can be tailored for a particular user.
F
(T/ F) the shell is the portion of the operating system that always resides in memory
F
A Beta release of a software usually released quickly as the result of a discovered problem, may not warrant a minor release.
F
A WAN is a collection of LANs and other forms of connectivity to provide a network within one metropolitan area such as connecting devices within the same city
F
A virtual machine is hardware.
F
All programs written in high level languages require compilation before the programs can be executed.
F
MAC address consists of 32 bits
F
Main memory is used during the "S" portion of the IPOS cycle.
F
Moore's law is a physical law that establishes how we can further miniaturize the circuits on a chip.
F
Organizations typically only have one system administrator who will be responsible for all aspects of administering the computer systems.
F
First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Which records are returned if we use the restriction Age > 40?
George Duke, Frank Zappa
Swap space is located where?
Hard disk
Storage devices are part of which component of the computer?
I/o subsystem
A topology that connects all devices to each other
Mesh
First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 This relation does not have an ID number to use as a unique identifier. Why could we not use Last Name as the unique identifier?
Multiple records share the same value
Which of these IT roles would be in charge of securing a computer network?
Network administrator
Which of these IT roles would most need knowledge of VoIP and trunking protocols?
Network administrator
The layer responsible about routing
Networking
Cables, media, hardware and topology
Physical
A layer converts data into a format that allows it to be transmitted across the network
Presentation
A topology that each device connects to two neighbor devices in a form of loop
Ring
The system administrator is responsible for each of the following tasks except
Securing a web site
Data synchronization and session establishment
Session
A topology has a central connection such as switch
Star
Which of these IT roles would most need knowledge how to install computer hardware
System administrator
(T/ F) users can access the operating system via the graphical user interface or the command line interface.
T
1 Megabyte is bigger than 30 Kilobyte
T
A Domain Name System (DNS) server responds to IP alias requests to map IP addresses.
T
A JPEG file will be smaller than a bitmap of the same image because the JPEG throws out some of the data to compress the file into a smaller file size
T
A single high-level language instruction might require many assembly or machine language instructions to accomplish the same task.
T
Computer users of the 1940s and 1950s were often the engineers and programmers who built and programmed the computers.
T
Conditions will always evaluate to either true or false.
T
During the Fetch-Execute cycle memory returns instruction over the data bus to be stored in IR
T
If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is.
T
It is the user who initiates when and what a computer should do.
T
Most of the first-generation computers were one-of-a-kind laboratory experimental machines.
T
PING is a network protocol that is used to determine if remote machine is accessible.
T
Pins on the CPU connect the internal CPU bus to the external system bus.
T
T/ F) if a printer is out of paper an interrupt is issued to interrupt the CPU's fetch-execute cycle
T
First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Which records are returned if we use the restriction State="CA"?
Thana Harris, Ian Underwood, Ruth Underwood, Frank Zappa
What is the difference between a router and a gateway?
They both serve as devices that route messages from one network to another but the gateway is used when the networks it connects are of different types
A layer provides a mechanism of carrying data across the network
Transport
Transistors replaced which of the following pieces of hardware?
Vacuum tubs
First Name Last Name City State Age George Duke Portland OR 44 Thana Harris San Diego CA 31 Tommy Mars New York NY 30 Ian Underwood San Francisco CA Ruth Underwood San Francisco CA 29 Frank Zappa Los Angeles CA 53 Should we make age the unique identifier? Provide a very brief explanation.
We might add records that have ages that are already in the table
Which of these IT roles would most need knowledge of using scripting languages like ASP, Perl and PHP?
Web developer
In what ways are high level programming languages easier to use than machine language and assembly language?
You are able to use instructions that convey more than primitive actions like if statements, for loops and lengthy assignment statements. You are also able to express your ideas in a more English and mathematical way.