______ is a step-by-step method for solving a problem or doing a task.a. A constructb. A recursionc. An iterationd. An algorithmAnswer:&nbs...
The _______ manager is responsible for access to I/O devices.
The _______ manager is responsible for access to I/O devices.a. memoryb. processc. deviced. fileAnswer:&nbs...
The _______ manager is responsible for archiving and backup.
The _______ manager is responsible for archiving and backup.a. memoryb. processc. deviced. fileAnswer:&nbs...
_____ can occur if a process has too many resource restrictions.
_____ can occur if a process has too many resource restrictions.a. Starvationb. Synchronizationc. Pagingd. DeadlockAnswer:&nbs...
To prevent _______, an operating system can put resource restrictions on pro-cesses.
To prevent _______, an operating system can put resource restrictions on pro-cesses.a. starvationb. synchronizationc. pagingd. deadlockAnswer:&nbs...
The _______ scheduler moves a process from one process state to another.
The _______ scheduler moves a process from one process state to another.a. jobb. processc. virtuald. queueAnswer:&nbs...
The _______ scheduler creates a process from a job and changes a process back to a job.
The _______ scheduler creates a process from a job and changes a process back to a job.a. jobb. processc. virtuald. queueAnswer:&nbs...
Every process is _______.
Every process is _______.a. only a jobb. only a programc. only a partitiond. a job and a programAnswer:&nbs...
A program becomes a _______ when it is selected by the operating system and brought to the hold state.
A program becomes a _______ when it is selected by the operating system and brought to the hold state.a. jobb. processc. deadlockd. partitionAnswer:&...
A process in the ready state goes to the running state when _______.
A process in the ready state goes to the running state when _______.a. it enters memoryb. it requests I/Oc. it gets access to the CPUd. it finishes r...
A process in the _______ state can go to either the ready, terminated, or waiting states.
A process in the _______ state can go to either the ready, terminated, or waiting states.a. holdb. virtualc. runningd. hold or runningAnswer:&nbs...
In _______, the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.
In _______, the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.a....
In _______, the program can be divided into differently sized sections.
In _______, the program can be divided into differently sized sections.a. partitioningb. pagingc. demand pagingd. demand segmentationAnswer:&nbs...
In paging, a program is divided into equally sized sections called _______.
In paging, a program is divided into equally sized sections called _______.a. pagesb. framesc. segmentsd. partitionsAnswer:&nbs...
______ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.
______ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.a. Partitioningb....
In _______, only one program can reside in memory for execution.
In _______, only one program can reside in memory for execution.a. mono-programmingb. multi-programmingc. partitioningd. pagingAnswer:&nbs...
_____ is multi-programming without swapping.
_____ is multi-programming without swapping.a. Partitioningb. Virtual memoryc. Demand pagingd. QueuingAnswer:&nbs...
______ is multi-programming with swapping.
______ is multi-programming with swapping.a. Partitioningb. Pagingc. Demand pagingd. QueuingAnswer:&nbs...
Multi-programming requires a _______ operating-system.
Multi-programming requires a _______ operating-system.a. batchb. time-sharingc. paralleld. distributedAnswer:&nbs...
______ supervises the activity of each component in a computer system.
______ supervises the activity of each component in a computer system.a. An operating systemb. Hardwarec. A queued. An application programAnswer:&nbs...
______ is a program that facilitates the execution of other programs.
______ is a program that facilitates the execution of other programs.a. An operating systemb. Hardwarec. A queued. An application programAnswer:&nbs...
What is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .ca
What is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .caa. invalid domainb. private domainc. secure domaind. country...
Identifies company or commercial sites
Identifies company or commercial sitesa. .orgb. .comc. .govd. .eduAnswer:&nbs...
Every computer looking to access the Internet would be known as this
Every computer looking to access the Internet would be known as thisa. clientb. desktopc. hubd. serverAnswer:&nbs...
______ is a protocol for accessing and transferring documents on the WWW.
______ is a protocol for accessing and transferring documents on the WWW.a. FTPb. SMTPc. TELNETd. HTTPAnswer:&nbs...
______ is a protocol for e mail services.
______ is a protocol for e mail services.a. FTPb. SMTPc. TELNETd. HTTPAnswer:&nbs...
______ is a protocol for file transfer.
______ is a protocol for file transfer.a. FTPb. SMTPc. TELNETd. HTTPAnswer:&nbs...
_____ protocol (s) is one of the protocols in the transport layer.
_____ protocol (s) is one of the protocols in the transport layer.a. Only TCPb. Only UDPc. Only SCTPd. TCP, UDP, and SCTPAnswer:&nbs...
IP addresses are currently _______ bits in length.
IP addresses are currently _______ bits in length.a. 4b. 8c. 32d. 40Answer:&nbs...
Which physical topology uses a hub or switch?
Which physical topology uses a hub or switch?a. busb. ringc. stard. bus and ringAnswer:&nbs...
What is the domain name in the e mail address kayla@nasa.gov?
What is the domain name in the e mail address kayla@nasa.gov?a. kaylab. kayla@nasa.govc. nasa.govd. govAnswer:&nbs...
The _______ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
The _______ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.a. transportb. networkc. data-linkd....
The _______ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
The _______ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.a. transportb. networkc....
The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.a. physicalb. data-linkc. networkd. transportAnswer: ...
The _______ layer of the TCP/IP protocol suite provides services for end users.
The _______ layer of the TCP/IP protocol suite provides services for end users.a. data-linkb. transportc. applicationd. physicalAnswer:&nbs...
The TCP/IP model has _______ layers.
The TCP/IP model has _______ layers.a. fiveb. sixc. sevend. eightAnswer:&nbs...
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.
To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.a. ANDb. ORc. XORd. NOTAnswer: ...
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then _______ the bit pattern and the mask.
To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then _______ the bit pattern and the mask.a. ANDb. ORc. XORd. NOTAnswer: ...
To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.
To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.a. ANDb. ORc. XORd. NOTAnswer: ...
We use a bit pattern called a _______ to modify another bit pattern.
We use a bit pattern called a _______ to modify another bit pattern.a. maskb. carryc. floatd. byteAnswer: ...
For the binary OR operation, only an input of _______ gives an output of 0.
For the binary OR operation, only an input of _______ gives an output of 0.a. two 0sb. two 1sc. one 0 and one 1d. two 2sAnswer:&nbs...
For the binary AND operation, only an input of _______ gives an output of 1.
For the binary AND operation, only an input of _______ gives an output of 1.a. two 0sb. two 1sc. one 0 and one 1d. two 2sAnswer:&nbs...
______ operator (s), if the input is two 1s, the output is 0.
______ operator (s), if the input is two 1s, the output is 0.a. In only ANDb. In only ORc. In only XORd. In AND, OR, or XORAnswer:&nbs...
______ operator (s), if the input is two 0s, the output is 0.
______ operator (s), if the input is two 0s, the output is 0.a. In only ANDb. In only ORc. In only XORd. In AND, OR, or XORAnswer:&nbs...
The unary _______ operator inverts its single input.
The unary _______ operator inverts its single input.a. ANDb. ORc. NOTd. XORAnswer:&nbs...
_____ operator (s) takes two inputs to produce one output.
_____ operator (s) takes two inputs to produce one output.a. Only ANDb. Only ORc. Only XORd. AND, OR, or XORAnswer:&nbs...
If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the smaller number _______.
If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the...
If the exponent in Excess_127 is binary 10000101, the exponent in decimal is _______.
If the exponent in Excess_127 is binary 10000101, the exponent in decimal is _______.a. 6b. 7c. 8d. 9Answer:&nbs...
In two's complement representation with a 4-bit allocation, we get _______ when we add 5 to 5.
In two's complement representation with a 4-bit allocation, we get _______ when we add 5 to 5.a. -5b. -6c. -7d. 10Answer:&nbs...
In two's complement representation with a 4-bit allocation, we get _______ when we add 1 to 7.
In two's complement representation with a 4-bit allocation, we get _______ when we add 1 to 7.a. 8b. 1c. -7d. -8Answer:&nbs...
For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is _______.
For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is _______.a. 8b. 127c. 128d. 256Answer:&nbs...
For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is _______.
For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is _______.a. -8b. -127c. -128d. -256Answer: ...
In two's complement addition, if there is a final carry after the left most column addition, _______.
In two's complement addition, if there is a final carry after the left most column addition, _______.a. add it to the right most columnb. add it to the...
The _______ method of integer representation is the most common method for storing integers in computer memory.
The _______ method of integer representation is the most common method for storing integers in computer memory.a. sign-and-magnitudeb. one's complementc....
______ is a logical bit operator.
______ is a logical bit operator.a. The exclusive ORb. The unary NOTc. The binary ANDd. exclusive OR, unary NOT, or binary ANDAnswer:&nbs...
_______ is an arithmetic operation.
_______ is an arithmetic operation.a. The exclusive ORb. The unary NOTc. Subtractiond. The binary ANDAnswer:&nbs...
The combination of sign and mantissa of a real number in IEEE standard float-ing point format is stored as an integer in the ____________ representation.
The combination of sign and mantissa of a real number in IEEE standard float-ing point format is stored as an integer in the ____________ representation.a....
The precision of the fractional part of a number stored in a computer is defined by the _______.
The precision of the fractional part of a number stored in a computer is defined by the _______.a. signb. exponentc. mantissad. last digitAnswer:&nbs...
When a fractional part is normalized, the computer stores the _______.
When a fractional part is normalized, the computer stores the _______.a. only the signb. only the exponentc. only the mantissad. the sign, exponent, and...
In an Excess conversion, we _______ the number to be converted.
In an Excess conversion, we _______ the number to be converted.a. add the bias number tob. the bias number fromc. multiply the bias number byd. divid...
Which number representation method is often used to store the exponential value of a fractional part?
Which number representation method is often used to store the exponential value of a fractional part?a. unsigned integersb. two's complementc. Excessd....
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?a. 17b. 16c. 65535d. 65536Answer: ...
In the _______ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
In the _______ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.a. bitmapb. vectorc. quantizedd....
In the _______ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.
In the _______ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.a. bitmapb. vectorc....
In the _______ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.
In the _______ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.a. bitmapb. vectorc. quantizedd. binaryAn...
An image can be represented in a computer using the _______ method.
An image can be represented in a computer using the _______ method.a. bitmap graphicb. vector graphicc. onlyd. either bitmap or vector graphicAnswer: ...
A 32-bit code called _______ represents symbols in all languages.
A 32-bit code called _______ represents symbols in all languages.a. ANSIb. Unicodec. EBCDICd. Extended ASCIIAnswer:&nbs...
If the ASCII code for E is 1000101, then the ASCII code for e is _______. An-swer the question without consulting the ASCII table.
If the ASCII code for E is 1000101, then the ASCII code for e is _______. An-swer the question without consulting the ASCII table.a. 1000110b. 1000111c....
How many symbols can be represented by a bit pattern with ten bits?
How many symbols can be represented by a bit pattern with ten bits?a. 128b. 256c. 512d. 1024Answer:&nbs...
In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.
In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.a. 4b. 5c. 6d. 7Answer:&nbs...
A byte consists of _______ bits.
A byte consists of _______ bits.a. 2b. 4c. 8d. 16Answer: ...
Convert the hexadecimal number 1B to decimal:
Convert the hexadecimal number 1B to decimal:a) 21b) 23c) 27d) 29Answer: ...
Convert the binary number 101010 to hexadecimal:
Convert the binary number 101010 to hexadecimal:a) 1Ab) 1Bc) 2Ad) 2BAnswer: ...
Convert the binary number 1001 to decimal. The answer is:
Convert the binary number 1001 to decimal. The answer is:a) 7b) 9c) 11d) 15Answer:&nbs...
Which of the following is equivalent to 24 in decimal?
Which of the following is equivalent to 24 in decimal?a) (11000)2b) (1A)16c) (31)8d) None of the othersAnswer:&nbs...
Which of the following is equivalent to 12 in decimal?
Which of the following is equivalent to 12 in decimal?a) (1110)2b) (C)16c) (15)8d) None of the othersAnswer:&nbs...
Which of the following representations is erroneous?
Which of the following representations is erroneous?a) (110)2b) (141)8c) (EF)16d) 22AAnswer:&nbs...
Which of the following representations is erroneous?
Which of the following representations is erroneous?a) (111)2b) (346)8c) (EEG)16d) 221Answer:&nbs...
Which of the following representations is erroneous?
Which of the following representations is erroneous?a) (10211)2b) (342)8c) (EEE)16d) 145Answer:&nbs...
Which of the following representations is erroneous?
Which of the following representations is erroneous?a) (10111)2b) (349)8c) (3AB)16d) 256Answer: ...
When converting a binary fraction to decimal, we repeatedly ____.
When converting a binary fraction to decimal, we repeatedly ____.a) divideb) multiplyc) add tod) subtract fromAnswer: ...
When converting a decimal integer to base b, we repeatedly _____
When converting a decimal integer to base b, we repeatedly _____a) divideb) multiplyc) add tod) subtract fromAnswer: ...
The base of the hexadecimal number system is ____.
The base of the hexadecimal number system is ____.a) 2b) 8c) 10d) 16Answer: ...
The base of the octal number system is ____.
The base of the octal number system is ____.a) 2b) 8c) 10d) 16Answer: ...
The base of the binary number system is ____.
The base of the binary number system is ____.a) 2b) 8c) 10d) 16Answer: ...
The base of the decimal number system is ____.
The base of the decimal number system is ____.a) 2b) 8c) 10d) 16Answer: ...
_____ separated the programming task from computer operation tasks.
_____ separated the programming task from computer operation tasks.a. Algorithmsb. Data processorsc. High-level programming languagesd. Operating systemsAnswer: ...
The first computing machine to use the idea of storage and programming was called _______.
The first computing machine to use the idea of storage and programming was called _______.a. the Madelineb. EDVACc. the Babbage machined. the Jacquard...
One of the first computers based on the von Neumann model was called _______.
One of the first computers based on the von Neumann model was called _______.a. Pascalb. Pascalinec. ABCd. EDVACAnswer:&nbs...
The first electronic special-purpose computer was called _______.
The first electronic special-purpose computer was called _______.a. Pascalb. Pascalinec. ABCd. ENIACAnswer:&nbs...
_____ is the design and writing of a program in structured form.
_____ is the design and writing of a program in structured form.a. Software engineeringb. Hardware engineeringc. Algorithm developmentd. Instructional...
______ is a set of instructions in a computer language that tells the computer what to do with data.
______ is a set of instructions in a computer language that tells the computer what to do with data.a. An operating systemb. An algorithmc. A data processord....
A 17th-century computing machine that could perform addition and subtraction was the _______.
A 17th-century computing machine that could perform addition and subtraction was the _______.a. Pascalineb. Jacquard loomc. Analytical Engined. Babbage...
FORTRAN and COBOL are examples of _______.
FORTRAN and COBOL are examples of _______.a. hardwareb. operating systemsc. computer languagesd. algorithmsAnswer: ...
A step-by-step solution to a problem is called _______.
A step-by-step solution to a problem is called _______.a. hardwareb. an operating systemc. a computer languaged. an algorithmAnswer:&nbs...
According to the von Neumann model, _______ are stored in memory.
According to the von Neumann model, _______ are stored in memory.a. only datab. only programsc. data and programsd. neither data nor programsAnswer:&...
In a computer, the _______ subsystem serves as a manager of the other subsys-tems.
In a computer, the _______ subsystem serves as a manager of the other subsys-tems.a. ALUb. input/outputc. memoryd. control unitAnswer: ...
In a computer, the _______ subsystem accepts data and programs and sends pro-cessing results to output devices.
In a computer, the _______ subsystem accepts data and programs and sends pro-cessing results to output devices.a. ALUb. input/outputc. memoryd. control...
In a computer, the _______ subsystem performs calculations and logical opera-tions.
In a computer, the _______ subsystem performs calculations and logical opera-tions.a. ALUb. input/outputc. memoryd. control unitAnswer:&nbs...
In a computer, the _______ subsystem stores data and programs.
In a computer, the _______ subsystem stores data and programs.a. ALUb. input/outputc. memoryd. control unitAnswer:&nbs...
The _______ model is the basis for today's computers.
The _______ model is the basis for today's computers.a. Leibnitzb. von Neumannc. Pascald. Charles BabbageAnswer:&nbs...
Subscribe to:
Posts (Atom)