Intro to computer science, College Course

Ace your homework & exams now with Quizwiz!

Select the correct choice that describes functions (or procedures)I Functions/procedures are reusable programming abstractionsII Functions/procedures increase the complexity of writing and maintaining programsII Functions/procedures reduce the complexity of writing and maintaining programs I and III only I only II only All of the above

I and III only

machine cycle

The process of fetching and executing instructions that is repeated over and over by the CPU

mutual exclusion

The requirement that a process complete a block of instructions before another process is allowed to start the block

Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? Network Link Transport Application

Transport

Which of the following instructions (as described in the language description table) will not change the contents of register 5? 1508 A503 2508 A508

A508

Which of the following instructions (as described in the language description table) is equivalent to requesting that register A be rotated to the left by three bits? AA03 AA08 AA01 AA05

AA05

bit

Binary digit

Which of the following events is detrimental to an operating system's performance? Deadlock Booting Interrupt

Deadlock

In which of the following locations is information most readily available for manipulation by the CPU? Main memory Mass storage General-purpose registers Cache memory

General-purpose registers

Which of the following is a technique for controlling access to a critical region? Booting Time sharing Spooling Semaphore

Semaphore

kernel

The heart of an operating system

Which of the following instructions (as described in the language description table) changes the contents of register 7? 4075 4077 37BB 4057

4057

Which of the following instructions (as described in the language description table) places 00000000 in register 5? 9555 8555 25FF 15FF

9555

Which of the following bit patterns represents the value 9 in binary notation? 11111011 00011010 00001001 11111011

00001001

Which of the following representations in binary notation represents the smallest value? 00011000 00010111 00011111 11110000

00010111

23

10111

7

111

Ethernet is a means of implementing which of the following network topologies? WiFi Star Correct answer: Bus

Bus

A section of a program that should be executed by at most one process at a time is called a Critical region Privileged instruction Utility

Critical region

Which of the following instructions does not fall in the category of arithmetic/logic instructions? ADD OR ROTATE JUMP

JUMP

ROM

Memory area whose contents cannot be altered

process

The activity of executing a program

What bit pattern is represented by 33.42.18 in dotted decimal notation? 00100001 00011010 00010010 00100001 00101010 00001010 00100001 00101010 00010010 00010010 00101010 00100001

00100001 00101010 00010010

What mask in register F would cause the instruction 8AAF (refer to the language description table) to put a 0 in the most significant bit of register A without disturbing the other bits? 01111111 11111110 00000001 10000000

01111111

A7DF is the hexadecimal representation for what bit pattern? 1010 1101 0111 1111 1111 0111 1101 1010 1010 0111 1101 1111 1111 1101 0111 1010

1010 0111 1101 1111

What is the result of the following binary addition problem? 00001111+10101010 011000101 10111001 10110101 01010101

10111001

Which of the following representations in binary notation represents the largest value? 10101010 10111111 11000000 01111111

11000000

58

111010

31

11111

Which of the following is a possible LZW compression of the message "xyz xyz xyz"? 232 1234 1234545 12

1234545

Express the bit pattern 0001001000001100 in dotted decimal notation. 18.14 18.12 20.14 14.20

18.12

Which of the following instructions (as described in the language description table) places 00000000 in register A? 200A 2A00 3A00 1A00

2A00

Which of the following instructions (as described in the language description table) changes the contents of a memory cell? 10AB 40AB 30AB 20AB

30AB

pixel

A small part of an image

flip-flop

A digital circuit capable of holding a single digit

register

A location within a CPU for temporary data storage

ANSI

A major standardization organization within the United States

GUI

A means of communicating with a computer user by means of images rather than words

GIF

A means of compressing an image file by restricting the number of colors available

JPEG

A means of compressing images by blurring the boundaries between different colors while maintaining all brightness information

machine language

A means of encoding instructions

MIDI

A means of encoding music in terms of notes and instruments rather than actual audio

masking

A means of isolating particular bits within a bit pattern

address

A numeric value used to identify a memory cell

directory path

A sequence of folders each containing the next

interrupt

A signal that suspends the CPUs current activities

deadlock

A situation in which activities find themselves waiting on each other

queue

A storage system in which the first entry in is the first entry out

ASCII

A system developed by the American Standards Institute for encoding text.

stored-program concept

A technique of recording programs in main memory from where they can be accessed and executed

Which of the following Boolean operations produces the output 1 for the fewest number of input patterns? OR XOR AND

AND

Boolean operation

AND, OR, XOR, NOT

Which of the following is assigned the task of providing individual users access to the Internet? ICANN Access ISPs Tier-1 ISPs Tier-2 ISPs

Access ISPs

interactive processing

Allows the user to communicate with the computer system while the user's application is being performed

hexadecimal notation

An efficient way of representing bit patterns

ISO

An international organization for establishing standards

The end of a time slice is indicted by the occurrence of a signal called An interrupt A login A semaphore

An interrupt

Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination? Link Network Application Transport

Application

load balancing

Assigning tasks to the processors that leads to efficient use of all processors

Execution of an operating system is initiated by a program called the Window manager Boot loader Scheduler

Boot loader

Which of the following concepts is not associated with critical regions? Bootstrap Mutual exclusion Semaphores

Bootstrap

Which kind of system describes a distributed system in which many independent computers work closely together to provide computation or services comparable to a much larger machine? Peer-to-peer network Open network Cluster computing POP3

Cluster computing

Which of the following is a task that is not performed by the kernel of an operating system? Avoid deadlock Allocate resources Communicate with the user Schedule processes

Communicate with the user

Hexadecimal notation is preferred to represent digital data. Choose the incorrect choice. it uses fewer digits than binary it is easier to read hex Computers can understand only hex it is convenient and brief

Computers can understand only hex

Which of the following is the process of overloading a computer with messages? Phishing Denial of Service Virus Spyware

Denial of Service

Which of the following components of an operating system handles the details associated with particular peripheral equipment? Memory manager Correct answer: Device drivers File manager

Device drivers

virtual memory

Extended storage space created by the memory manager

What is the representation of the bit pattern 1111010010011011 in hexadecimal notation? F40D E59B E59B F49B

F49B

Which of the following is not an activity performed entirely within a CPU? Perform Boolean operations Move data between registers Perform arithmetic operations Fetch instructions

Fetch instructions

Select the correct format in which a CPU executes an instruction Decode the bit pattern, fetch the instruction from memory, perform the action Fetch the instruction from memory, decode the bit pattern, perform the action There is not particular format in which a CPU executes an instruction, it is random Perform the action, fetch the instruction from memory, decode the bit pattern

Fetch the instruction from memory, decode the bit pattern, perform the action

Which of the following components of an operating system maintains the directory system? File manager Memory manager Device drivers

File manager

Which of the following would not require real-time processing? Navigation of an aircraft Forecasting world-wide trend for the next five-year period Typing a document with a word processor Maintaining an airline reservation system

Forecasting world-wide trend for the next five-year period

The bit pattern 001010101101001011 may representI instructionsII data II only I only I and II Neither I or II

I and II

Which of the following is not a means of performing interprocess communication over a network? ICANN Peer-to-peer Client/server

ICANN

Which technique allows the user to communicate with the computer while the user's application is being executed? Bootstrapping Interactive processing Batch processing Load balancing

Interactive processing

Which of the following instructions falls in the category of data transfer instructions? ROTATE LOAD AND JUMP

LOAD

Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system? Maintain records regarding the ownership of files None of the above Maintain records regarding the location of files Maintain records regarding the size of files

Maintain records regarding the ownership of files

Which of the following is not contained in a CPU? Instruction register Program counter Memory cell General-purpose register

Memory cell

A user running more than one application at the same time in a computer with only one CPU is accomplished by a technique called Bootstrapping Multitasking Batch processing

Multitasking

Which of the following is not an attempt to provide security? Privilege levels Passwords Multitasking

Multitasking

In terms of the inputs, which one of the Boolean operations AND, OR, EXCLUSIVE OR, and NOT, is the least like the others? NOT AND EXCLUSIVE OR OR

NOT

Which of the following is used to translate between IP addresses and mnemonic addresses? FTP server Name server Mail server File server

Name server

A good password must contain the following except: Numbers Special Characters Capital letters Name, birthdate, nickname

Name, birthdate, nickname

Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? Transport Network Link Application

Network

instruction register

Register whose contents is modified upon performing the fetch step of the machine cycle

Which of the following connects existing networks to form an internet? Router Repeater Switch Bridge

Router

Which of the following is not a way of classifying networks? Closed versus open Star versus bus WAN versus LAN Router versus bridge

Router versus bridge

time sharing

The act of more than one user using a computer at the same time

bus

The communication path between a CPU and main memory

op-code

The part of a machine instruction that identifies the basic operation to be performed

user interface

The part of an operating system that communicates with the user

multitasking

The phenomenon of a user performing more than one activity at the same time

boot loader

The program first executed when a computer is turned on

Which of the following is a program that enters a computer system disguised as a desirable program, such as a game or useful utility package, that is willingly imported by the victim? Worm Virus Trojan horse Sniffer

Trojan horse

program counter

Used by the CPU to keep its place in the programs main memory from where instructions can be retrieved and executed

Which of the following components of an operating system is not part of the kernel? Scheduler User Interface File manager

User Interface

Arrange the following numbers in ascending order: a Binary 1011b Decimal 8c Hexadecimal F Correct answer: b, a, c c, b, a All numbers are equal a, b, c

b, a, c

The latest trend in distributed systems whereby huge pools of shared computers on the network can be allocated for use by clients as needed is called ____. VoIP LAN computing cloud computing tier-1 computing

cloud computing

The ____ model is also a popular means of distributing files such as music recordings and motion pictures via the Internet. business-to-business open source peer-to-peer client/server

peer-to-peer

To increase the security of the passwords, many online accounts now use one of the following techniques: account details via email password check over a phone call change phone number on the account two-factor authentication

two-factor authentication


Related study sets

Simulation Lab 5.1: Module 05 Recover Lost or Stolen Mobile Devices

View Set

Ethical Hacking Chapter 12: Linux and Penetration Testing

View Set

Evolve: Psychobiological Disorders

View Set

Biol 322 Exam 4 (ch. 11-15, 18, 19, 20)

View Set

Chapter 2 Stakeholder Relationships, Social Responsibility, and Corporate Governance

View Set