CSCI Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination? A) application B) transport C) network D) link

B

Which of the following is a notational system for representing object-oriented design? A) UML B) Structure charts C) Modular designs D) Dataflow diagrams

A

Translate the binary representation 1100 into its equivalent base ten representation.

12

Which of the following events is detrimental to an operating system's performance? A) Deadlock B) Interrupt C) Booting

A

Which of the following is not a feature of UML? A) Use case diagrams B) Class diagrams C) Dataflow diagrams D) Sequence diagrams

C

Which of the following is not a way of classifying networks? A) WAN vs LAN B) Closed vs open C) Router vs bridge D) Star vs bus

C

Which of the following is not an attempt to provide security? A) Passwords B) Privilege levels C) Multitasking

C

Which of the following is not associated with the concept of a data type? A) Coercion B) Boolean C) Operator precedence D) Strongly typed language

C

Is designing test data to ensure that each instruction is executed at least once black box or glass box testing?

glass box

What condition indicates a linked list is empty?

head pointer is NULL

An entity conforming to a type

instance

What command in a Windows Command Prompt do we give to determine our IP address?

ipconfig

A data storage system in which items are connected via pointers

linked structure

A general sequential storage structure

list

What is a disadvantage of both machine languages and assembly languages that is overcome by high level programming languages?

machine dependent

As a general rule, one should strive to _______ coupling between modules and to _________ cohesion within modules.

minimize, maximize

What allows a group of devices in a network to connect with only a single IP address?

network address translation

Between what two layers does MPLS reside?

network, link

Indicates the end

null pointer

Contains the address at which an entity is stored

pointer

What type of method can be invoked from outside an instance of a class?

public

A FIFO storage structure

queue

TCP uses acknowledgements while UDP does not, so TCP is more _________ but less __________ than UDP.

reliable, efficient

The top node of a tree

root

Is the manner in which its internal objects will interact represented in a use case diagram, a class diagram, or a sequence diagram?

sequence

A LIFO storage structure

stack

The "head" of a stack

top

A storage structure that may contain siblings

tree

Answer the logic problem: 10101010 AND 11110000

10100000

In a two's complement system, what value is represented by the pattern 11111111111111001?

-7

Using a two's complement notation system in which each value is represented by a pattern of six bits, represent the value 5.

000101

What bit pattern is represented by 33.42.18 in dotted decimal notation?

00100001 00101010 00010010

Answer the logic problem: 10101010 XOR 11110000

01011010

What sequence of numbers would be printed if the following function were executed with the value of N being 0? def xxx(N): print(N) if (N < 2): xxx(N + 1) else: print(N) print(N)

0122210

A7DF is the hexadecimal representation for what bit pattern?

1010011111011111

Rewrite 23 in binary notation.

10111

Rewrite 7 in binary notation.

111

Using a two's complement notation system in which each value is represented by a pattern of six bits, represent the value -5.

111011

Answer the logic problem: 10101010 OR 11110000

11111010

How many bits are in an IPv6 address?

128

At most, how many entries in a list of 5000 names will be interrogated when using the binary search algorithm?

13

Translate the binary representation 10001 into its equivalent base ten representation.

17

Express the bit pattern 00010010 00001100 in dotted decimal notation.

18.12

How many class B networks can there be?

2^14, 16,384

The following is a program segment and the definition of a function named sub. x = 3; sub(x) print(x); def sub(y): y = 5; What value willl be printed if the parameters are passed by value? What if they are passed by reference?

3, 5

How many bits are in an IPv4 address?

32

Consider the base represented by grouping five digits of a binary string and assume the same convention used in creating hexadecimal digits. In that base, what is the largest one digit number we can represent (ie how would we write the value of the largest one-digit value in that base)?

4

We have seen if we group a binary string of digits into fours we get base 16, three we get base 8, etc. What base would we get if we grouped digits in groups of two?

4

At most, how many entries in a list of 5000 names will be interrograted when using the sequential search algorithm?

5000

If the two-dimensional array X were stored in row-major order, then in the block of main memory containing X, which of the following would be true? A) The entry X[1,2] would appear before X[2,1] B) The entry X[1,2] would appear after X[2,1] C) The entry X[1,2] would be in the same location as X[2,1] D) None of the above

A

In a machine language, the technique in which the data to be manipulated by an instruction is included within the instruction itself is called A) Immediate addressing B) Direct addressing C) Indirect addressing

A

In general, an algorithm in which of the following categories is considered more efficient? A) O(log2 n) B) O(n) C) O(n log2 n) D) O(n^2)

A

Positions within arrays are identified by means of numbers called A) Indices B) Parameters C) Instance variables D) Constants

A

The binary search algorithm is an example of an algorithm in which of the following classes? A) O(log2 n) B) O(n) C) O(n log2 n) D) O(n^2)

A

The end of a time slice is indicated by the occurrence of a signal called: A) An interrupt B) A semaphore C) A login

A

The primary purpose of which of the following is not the enhancement of security? A) ICANN B) Firewall C) Encryption D) CERT

A

Under the assumption that N takes on only integer values, which of the following is the termination condition in the following recursive function? def xxx(N): if (N < 5): print(N) else: xxx(N - 1) A) N < 5 B) N > 4 C) N > 5

A

Under the assumption that X takes on only integer values, which of the following is the termination condition for the following loop? repeat: ... until (X < 5) A) X < 5 B) X > 4 C) x > 5

A

Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination? A) application B) transport C) network D) link

A

Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? A) application B) transport C) network D) link

A

Which of the following Boolean operations produces the output 1 for the fewest number of input patterns? A) AND B) OR C) XOR

A

Which of the following components of an operating system is executed as the result of an interrupt signal? A) Dispatcher B) Memory manager C) File manager

A

Which of the following data storage systems provides the most efficient random access to individual data items? A) Main memory B) Magnetic disk C) CDs/DVDs D) Flash drives

A

Which of the following is a task that is not performed by the kernel of an operating system? A) Communicate with the user B) Schedule processes C) Allocate resources D) Avoid deadlock

A

Which of the following is not a step in the process of translating a program? A) Executing the program B) Parsing the program C) Lexical analysis D) Code generation

A

Which of the following is not a way of representing algorithms? A) Stepwise refinement B) Pseudocode C) Flowchart D) Programming language

A

Which of the following is not an activity performed entirely within a CPU? A) Fetch instructions B) Perform Boolean operations C) Perform arithmetic operations D) Move data between registers

A

Which of the following is not constructed by a typical compiler? A) Source code B) Symbol table C) Parse tree D) Object program

A

Which of the following is static in the sense that it does not change size or shape as information is stored and retrieved? A) Array B) Stack C) Queue D) Tree

A

Which of the following representations in two's complement notation represents the largest value? A) 00000010 B) 11110000 C) 00000001 D) 11111111

A

What is the stage of software development in which user needs are analyzed?

Analysis

Which software is used for specific user tasks?

Application

List three of the primitives in the pseudocode developed in Chapter 5.

Assignment, conditional selection, repeated execution

A section of a program that should be executed by at most one process at a time is called a A) Utility B) Critical region or section C) Privileged instruction

B

Suppose you were going to retrieve items of data that you would later need to process the opposite order from that in which they were received. Which of the following would be the best structure in which to store the items? A) Tree B) Stack C) Queue D) Traditional linked list

B

Under the assumption that N takes on only integer values, which of the following is the termination condition in the following recursive function? def xxx(N): if (N < 5): xxx(N + 1) else: print(N) A) N < 5 B) N > 4 C) N < 4

B

Under the assumption that X takes on only integer values, which of the following is the termination condition for the following loop? while (X < 5): ... A) X < 5 B) X > 4 C) X < 4

B

When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom which of the entries will be found most quickly using the binary search algorithm? A) Lewis B) Pat C) Tom

B

Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? A) application B) transport C) network D) link

B

Which layer of the TCP/IP hierarchy decides which application sohuld receive an incoming message? A) application B) transport C) network D) link

B

Which of the following best describes the NOR operation? A) An XOR followed by a NOT B) An OR followed by a NOT C) A NOT followed by an OR D) An AND followed by a NOT

B

Which of the following connects existing networks to form an internet? A) Bridge B) Router C) Switch D) Repeater

B

Which of the following identifies the application to which a message arriving from the Internet should be given? A) protocol B) port number C) domain D) hop count

B

Which of the following is a LIFO structure? A) Array B) Stack C) Queue D) Tree

B

Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3 repeat: X = X + 2 until (X > 5) A) X > 5 B) X < 8 C) X >= 5 D) X <= 6

B

Which of the following is a means of controlling the complexity of a software system? A) CRC cards B) Modularity C) Specifications D) Beta testing

B

Which of the following is a protocol for controlling the right to transmit a message in a network? A) UDP B) CSMA/CD C) TCP D) FTP

B

Which of the following is not a means of connecting networks? A) switch B) server C) router D) bridge

B

Which of the following is not a means of performing interprocess communications over a network? A) Client/server B) ICANN C) Peer-to-peer

B

Which of the following is not associated with object-oriented programming? A) Inheritance B) Resolution C) Encapsulation D) Polymorphism

B

Which of the following is the base case in the recursive function below? def xxx(N): if (N == 0): print(N) else: xxx(N - 1) A) N > 0 B) N = 0 C) N < 0

B

Which of the following is the scope of the variable? A) The number of characters in the variable's name B) The portion of the program in which the variable can be accessed C) The type associated with the variable D) The structure associated with the variable

B)

Which of the following is not a control statement? A) If-else statement B) While statement C) Assignment statement D) For statement

C

List two network topologies.

Bus, star

Assuming that each of the following bit patterns originally had an event parity, which one contains an error? A) 100110100 B) 110000011 C) 010011000 D) 100011001

C

Ethernet is a means of implementing which of the following network topologies? A) Star B) WiFi C) Bus

C

Execution of an operating system is initiated by a program called the: A) Window manager B) Scheduler C) Boot loader

C

In a machine language, the technique in which an instruction contains the location of a pointer to the data to be manipulated is called A) Immediate addressing B) Direct addressing C) Indirect addressing

C

Multitasking in a computer with only one CPU is accomplished by a technique called: A) Bootstrapping B) Batch processing C) Multiprogramming

C

Suppose a binary tree contained the nodes W, X, Y, and Z. If W and X were children of Y, and Z had no children, which node would be the root? A) W B) X C) Y D) Z

C

Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? A) application B) transport C) network D) link

C

Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two's complement notation? A) 3F B) 55 C) A6 D) 7E

C

Which of the following bit patterns represents the value 9 in two's complement notation? A) 00011010 B) 11111011 C) 00001001 D) 11111011

C

Which of the following does not require a Boolean condition? A) If-else statement B) While statement C) Assignment statement D) For loop statement

C

Which of the following is a FIFO structure? A) Array B) Stack C) Queue D) Tree

C

Which of the following is a technique for controlling access to a critical region? A) Spooling B) Time sharing C) Semaphore D) Booting

C

Which of the following is assigned the task of providing individual users access to the Internet? A) Tier 1 ISPs B) Tier 2 ISPs C) Access ISPs D) ICANN

C

Which of the following is the method proposed by UML for representing sequences of communication between objects? A) Class diagram B) Use case diagram C) Sequence diagram D) Generalizatoin

C

Which of the following is used to translate between IP addresses and mnemonic addresses? A) file server B) mail server C) name server D) FTP server

C

Which of the following storage systems is best suited for storing and retrieving long strings of data that are processed in their sequential order? A) Main memory B) Magnetic disk C) CDs/DVDs

C

Which standards organization produced the OSI reference model for internet communication? A) ANSI B) IEEE C) ISO

C

The following is an error-correcting code in which any two patterns differ by a Hamming distance of at least three. Symbol Representation A 000000 B 001111 C 010011 D 011100 E 100110 F 101001 G 110101 H 111010 Decode: 010011 101010 011000 101101

C, H, D, F

If a queue contained the entries B, C, D (from head to tail), what would be the contents of the queue (again from head to tail) after one entry was removed and the entry A was inserted?

CDA

If my IP address is 92.39.255.15 is the network Class A, B, C, or D?

Class A

What part of the program compiler constructs machine language instructions?

Code generator

What type of method within a class creates and object of the class?

Constructor

In which of the following addition problems (using two's complement notation) does an overflow error occur? A) 0011+1010 B) 1100+0100 C) 1100+1100 D) 0100+0100

D

In which of the followng locations is information most readily available for manipulation by the CPU? A) Cache memory B) Main memory C) Mass storage D) General-purpose registers

D

Explain why such terms as kilo, mega, and giga have acquired double meanings.

Different bases

The insertion sort algorithm is an example of which of an algorithm in which of the following classes? A) O(log2 n) B) O(n) C) O(n log2 n) D) O(n^2)

D

Which layer of the TCP/IP hierarchy actually transmits a message? A) application B) transport C) network D) link

D

Which of the following instructions does not fall in the category of arithmetic/logic instructions? A) ROTATE B) ADD C) OR D) JUMP

D

Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3 while (X < 5): X = X + 2 A) X > 5 B) X < 5 C) X>= 5 D) X <= 5

D

Which of the following is an example of a language that is based on the object-oriented paradigm? A) LISP B) PROLOG C) C D) C++

D

Which of the following is ignored by the compiler? A) Control statements B) Declarations of constants C) Function headers D) Comment statements

D

Which of the following is not a means of repeating a block of instructions? A) Pretest loop B) Posttest loop C) Recursion D) Assignment statement

D

Which of the following is not an application of the Internet? A) FTP B) Email C) Telnet D) CERT

D

Which of the following is not contained in a CPU? A) Intruction register B) Program counter C) General-purpose register D) Memory cell

D

Which of the following is not represented in a class diagram? A) Generalizations B) The methods within a class C) The attributes within a class D) The number of instances a class will have

D

Which of the following mass storage systems does not require physical motion? A) Magnetic tape B) Magnetic disk C) CDs/DVDs D) Flash drives

D

Suppose a queue contained the entries A, B, C, D (from head to tail) and suppose that the entries were removed and pushed on a stack one at a time until the queue was empty. What would be the contents of the queue (again from head to tail) if the entries were then popped from the stack and inserted back in the queue one at a time?

DCBA

What is it called when there are two or more processes waiting for a release from each other to use resources?

Deadlock

What is the stage of software development in which class diagrams are drawn?

Design

What type of method is called when an object is deleted to release the memory allocated to the object?

Destructor

Represent the bit pattern 1111010010011011 in hexadecimal notation.

F49B

What is the stage of software development in which programming is conducted?

Implementation

List two data types that occur as primitive types in many high-level programming languages.

Integer, character

When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom which of the entries will be found most quickly using the sequential search algorithm?

Lewis

What part of the program compiler reads the source code and splits it into tokens?

Lexical analyzer

List two popular operating systems.

Linux, Windows

What routing technique speeds up flow by directing data to the next node through the shortest path rather than repeatedly looking up addresses in routing tables?

MPLS (multiprotocol label switching)

What part of the program compiler views the tokens and groups them into statements?

Parser

Which software is used to operate computer hardware?

System

What are two protocols for implementing the transport level in the TCP/IP hierarchy?

TCP, UDP

A custom-built data type including both data and operations

abstract data type

The separation of internal implementation from external functionality

abstraction

Used to find entries in an array

address polynomial

A "rectangular" block of data whose entries are of the same type

array

Is testing to see if the software system meets the requirements identified during the original analysis black box or glass box testing?

black box

Is testing to see if the system performs in a timely manner black box or glass box testing?

black box

A 'type" whose instances are objects

class

Are relationships among classes represented in a use case diagram, a class diagram, or a sequence diagram?

class

Are the methods within a class represented in a use case diagram, a class diagram, or a sequence diagram?

class

In an object-oriented design using UML, _______ diagrams are used to represent classes and their basic relationships, whereas ________ diagrams are used to represent communication between objects.

class, sequence

In the context of the object-oriented paradigm, _______ are blueprints from which _______ are constructed. We say that the latter is an instance of the former.

classes, objects

In addition to the function's name, what other information is contained in a typical function header?

datatype

Are the ways in which the system will interact with its environment represented in a use case diagram, a class diagram, or a sequence diagram?

use-case

A template for an aggregate

user-defined data type


Kaugnay na mga set ng pag-aaral

Advertising and Marketing Communications Exam 1

View Set

NCLEX Pharm: Infectious disease and Respiratory

View Set

IEC 62443-1/2-1 & 3-3 Abbreviated Terms and Acronyms

View Set

NUR 128: Family Exam 2 practice questions.

View Set

CIS 3347 Chapter 3 True/False questions

View Set