Intro to computer science, College Course
Select the correct choice that describes functions (or procedures)I Functions/procedures are reusable programming abstractionsII Functions/procedures increase the complexity of writing and maintaining programsII Functions/procedures reduce the complexity of writing and maintaining programs I and III only I only II only All of the above
I and III only
machine cycle
The process of fetching and executing instructions that is repeated over and over by the CPU
mutual exclusion
The requirement that a process complete a block of instructions before another process is allowed to start the block
Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? Network Link Transport Application
Transport
Which of the following instructions (as described in the language description table) will not change the contents of register 5? 1508 A503 2508 A508
A508
Which of the following instructions (as described in the language description table) is equivalent to requesting that register A be rotated to the left by three bits? AA03 AA08 AA01 AA05
AA05
bit
Binary digit
Which of the following events is detrimental to an operating system's performance? Deadlock Booting Interrupt
Deadlock
In which of the following locations is information most readily available for manipulation by the CPU? Main memory Mass storage General-purpose registers Cache memory
General-purpose registers
Which of the following is a technique for controlling access to a critical region? Booting Time sharing Spooling Semaphore
Semaphore
kernel
The heart of an operating system
Which of the following instructions (as described in the language description table) changes the contents of register 7? 4075 4077 37BB 4057
4057
Which of the following instructions (as described in the language description table) places 00000000 in register 5? 9555 8555 25FF 15FF
9555
Which of the following bit patterns represents the value 9 in binary notation? 11111011 00011010 00001001 11111011
00001001
Which of the following representations in binary notation represents the smallest value? 00011000 00010111 00011111 11110000
00010111
23
10111
7
111
Ethernet is a means of implementing which of the following network topologies? WiFi Star Correct answer: Bus
Bus
A section of a program that should be executed by at most one process at a time is called a Critical region Privileged instruction Utility
Critical region
Which of the following instructions does not fall in the category of arithmetic/logic instructions? ADD OR ROTATE JUMP
JUMP
ROM
Memory area whose contents cannot be altered
process
The activity of executing a program
What bit pattern is represented by 33.42.18 in dotted decimal notation? 00100001 00011010 00010010 00100001 00101010 00001010 00100001 00101010 00010010 00010010 00101010 00100001
00100001 00101010 00010010
What mask in register F would cause the instruction 8AAF (refer to the language description table) to put a 0 in the most significant bit of register A without disturbing the other bits? 01111111 11111110 00000001 10000000
01111111
A7DF is the hexadecimal representation for what bit pattern? 1010 1101 0111 1111 1111 0111 1101 1010 1010 0111 1101 1111 1111 1101 0111 1010
1010 0111 1101 1111
What is the result of the following binary addition problem? 00001111+10101010 011000101 10111001 10110101 01010101
10111001
Which of the following representations in binary notation represents the largest value? 10101010 10111111 11000000 01111111
11000000
58
111010
31
11111
Which of the following is a possible LZW compression of the message "xyz xyz xyz"? 232 1234 1234545 12
1234545
Express the bit pattern 0001001000001100 in dotted decimal notation. 18.14 18.12 20.14 14.20
18.12
Which of the following instructions (as described in the language description table) places 00000000 in register A? 200A 2A00 3A00 1A00
2A00
Which of the following instructions (as described in the language description table) changes the contents of a memory cell? 10AB 40AB 30AB 20AB
30AB
pixel
A small part of an image
flip-flop
A digital circuit capable of holding a single digit
register
A location within a CPU for temporary data storage
ANSI
A major standardization organization within the United States
GUI
A means of communicating with a computer user by means of images rather than words
GIF
A means of compressing an image file by restricting the number of colors available
JPEG
A means of compressing images by blurring the boundaries between different colors while maintaining all brightness information
machine language
A means of encoding instructions
MIDI
A means of encoding music in terms of notes and instruments rather than actual audio
masking
A means of isolating particular bits within a bit pattern
address
A numeric value used to identify a memory cell
directory path
A sequence of folders each containing the next
interrupt
A signal that suspends the CPUs current activities
deadlock
A situation in which activities find themselves waiting on each other
queue
A storage system in which the first entry in is the first entry out
ASCII
A system developed by the American Standards Institute for encoding text.
stored-program concept
A technique of recording programs in main memory from where they can be accessed and executed
Which of the following Boolean operations produces the output 1 for the fewest number of input patterns? OR XOR AND
AND
Boolean operation
AND, OR, XOR, NOT
Which of the following is assigned the task of providing individual users access to the Internet? ICANN Access ISPs Tier-1 ISPs Tier-2 ISPs
Access ISPs
interactive processing
Allows the user to communicate with the computer system while the user's application is being performed
hexadecimal notation
An efficient way of representing bit patterns
ISO
An international organization for establishing standards
The end of a time slice is indicted by the occurrence of a signal called An interrupt A login A semaphore
An interrupt
Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message's destination? Link Network Application Transport
Application
load balancing
Assigning tasks to the processors that leads to efficient use of all processors
Execution of an operating system is initiated by a program called the Window manager Boot loader Scheduler
Boot loader
Which of the following concepts is not associated with critical regions? Bootstrap Mutual exclusion Semaphores
Bootstrap
Which kind of system describes a distributed system in which many independent computers work closely together to provide computation or services comparable to a much larger machine? Peer-to-peer network Open network Cluster computing POP3
Cluster computing
Which of the following is a task that is not performed by the kernel of an operating system? Avoid deadlock Allocate resources Communicate with the user Schedule processes
Communicate with the user
Hexadecimal notation is preferred to represent digital data. Choose the incorrect choice. it uses fewer digits than binary it is easier to read hex Computers can understand only hex it is convenient and brief
Computers can understand only hex
Which of the following is the process of overloading a computer with messages? Phishing Denial of Service Virus Spyware
Denial of Service
Which of the following components of an operating system handles the details associated with particular peripheral equipment? Memory manager Correct answer: Device drivers File manager
Device drivers
virtual memory
Extended storage space created by the memory manager
What is the representation of the bit pattern 1111010010011011 in hexadecimal notation? F40D E59B E59B F49B
F49B
Which of the following is not an activity performed entirely within a CPU? Perform Boolean operations Move data between registers Perform arithmetic operations Fetch instructions
Fetch instructions
Select the correct format in which a CPU executes an instruction Decode the bit pattern, fetch the instruction from memory, perform the action Fetch the instruction from memory, decode the bit pattern, perform the action There is not particular format in which a CPU executes an instruction, it is random Perform the action, fetch the instruction from memory, decode the bit pattern
Fetch the instruction from memory, decode the bit pattern, perform the action
Which of the following components of an operating system maintains the directory system? File manager Memory manager Device drivers
File manager
Which of the following would not require real-time processing? Navigation of an aircraft Forecasting world-wide trend for the next five-year period Typing a document with a word processor Maintaining an airline reservation system
Forecasting world-wide trend for the next five-year period
The bit pattern 001010101101001011 may representI instructionsII data II only I only I and II Neither I or II
I and II
Which of the following is not a means of performing interprocess communication over a network? ICANN Peer-to-peer Client/server
ICANN
Which technique allows the user to communicate with the computer while the user's application is being executed? Bootstrapping Interactive processing Batch processing Load balancing
Interactive processing
Which of the following instructions falls in the category of data transfer instructions? ROTATE LOAD AND JUMP
LOAD
Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system? Maintain records regarding the ownership of files None of the above Maintain records regarding the location of files Maintain records regarding the size of files
Maintain records regarding the ownership of files
Which of the following is not contained in a CPU? Instruction register Program counter Memory cell General-purpose register
Memory cell
A user running more than one application at the same time in a computer with only one CPU is accomplished by a technique called Bootstrapping Multitasking Batch processing
Multitasking
Which of the following is not an attempt to provide security? Privilege levels Passwords Multitasking
Multitasking
In terms of the inputs, which one of the Boolean operations AND, OR, EXCLUSIVE OR, and NOT, is the least like the others? NOT AND EXCLUSIVE OR OR
NOT
Which of the following is used to translate between IP addresses and mnemonic addresses? FTP server Name server Mail server File server
Name server
A good password must contain the following except: Numbers Special Characters Capital letters Name, birthdate, nickname
Name, birthdate, nickname
Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? Transport Network Link Application
Network
instruction register
Register whose contents is modified upon performing the fetch step of the machine cycle
Which of the following connects existing networks to form an internet? Router Repeater Switch Bridge
Router
Which of the following is not a way of classifying networks? Closed versus open Star versus bus WAN versus LAN Router versus bridge
Router versus bridge
time sharing
The act of more than one user using a computer at the same time
bus
The communication path between a CPU and main memory
op-code
The part of a machine instruction that identifies the basic operation to be performed
user interface
The part of an operating system that communicates with the user
multitasking
The phenomenon of a user performing more than one activity at the same time
boot loader
The program first executed when a computer is turned on
Which of the following is a program that enters a computer system disguised as a desirable program, such as a game or useful utility package, that is willingly imported by the victim? Worm Virus Trojan horse Sniffer
Trojan horse
program counter
Used by the CPU to keep its place in the programs main memory from where instructions can be retrieved and executed
Which of the following components of an operating system is not part of the kernel? Scheduler User Interface File manager
User Interface
Arrange the following numbers in ascending order: a Binary 1011b Decimal 8c Hexadecimal F Correct answer: b, a, c c, b, a All numbers are equal a, b, c
b, a, c
The latest trend in distributed systems whereby huge pools of shared computers on the network can be allocated for use by clients as needed is called ____. VoIP LAN computing cloud computing tier-1 computing
cloud computing
The ____ model is also a popular means of distributing files such as music recordings and motion pictures via the Internet. business-to-business open source peer-to-peer client/server
peer-to-peer
To increase the security of the passwords, many online accounts now use one of the following techniques: account details via email password check over a phone call change phone number on the account two-factor authentication
two-factor authentication