1.
In the decimal or binary notations, the symbol used to represent a digit and the digit’s position in a string determines its ____.
Correct Answer
D. Value
Explanation
The symbol used to represent a digit and its position in a string determines its value. In both decimal and binary notations, the value of a digit is determined by its position within the number and the symbol used to represent it. The position of a digit in a number affects its place value, which in turn determines its overall value within the number. Therefore, the value of a digit is determined by its position and the symbol used to represent it.
2.
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated tostore it.
Correct Answer
D. Underflow
Explanation
Underflow occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it. This happens when a number becomes too small to be represented accurately in the given number of bits. In other words, the magnitude of the number is smaller than the smallest positive number that can be represented.
3.
A(n) ____ is a set of related data values.
Correct Answer
B. List
Explanation
A list is a set of related data values. It is a data structure that stores elements in a specific order and allows for efficient insertion, deletion, and retrieval of elements. Unlike an array, a list does not have a fixed size and can dynamically grow or shrink as elements are added or removed. Lists are commonly used in programming to store and manipulate collections of data.
4.
A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.
Correct Answer
C. Linked list
Explanation
A linked list is a data structure that uses pointers to connect individual elements, allowing them to be stored in non-sequential locations. Unlike arrays, which store elements in contiguous memory locations, linked lists can store elements anywhere in memory and connect them using pointers. This flexibility allows for efficient insertion and deletion of elements, as well as dynamic resizing of the list.
5.
During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.
Correct Answer
C. Fetch
Explanation
During the fetch cycle of the CPU, data inputs are prepared for transformation into data outputs. This involves retrieving instructions and data from the memory and loading them into the CPU for processing. The fetch cycle is the first step in the instruction execution process, where the CPU fetches the next instruction from memory to be executed. This allows the CPU to access the necessary data and instructions required for the upcoming operations.
6.
A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.
Correct Answer
D. MOVE
Explanation
The MOVE instruction is the correct answer because it is specifically designed to copy data bits to storage locations. It allows for the copying of data between any combination of registers and primary storage locations, making it a versatile instruction for data manipulation and transfer.
7.
An ____ is a template that specifies the number of operands and the position and length of the op code and operands.
Correct Answer
A. Instruction format
Explanation
An instruction format is a standardized structure that defines the number and arrangement of operands, as well as the position and length of the opcode and operands within a computer instruction. It serves as a template or blueprint for encoding and decoding instructions in a computer's instruction set architecture. The instruction format ensures consistency and compatibility in the execution of instructions by providing a clear and defined structure for the computer's processor to follow.
8.
When manipulating single-precision floating-point numbers, CPU performance is measured in ____.
Correct Answer
C. MFLOPS
Explanation
When manipulating single-precision floating-point numbers, CPU performance is measured in MFLOPS. This is because MFLOPS stands for "Millions of Floating-Point Operations Per Second," which is a common metric used to measure the performance of CPUs when performing mathematical operations on floating-point numbers. It indicates the number of floating-point calculations a CPU can perform in one second, with higher values indicating better performance.
9.
____ states that the cost of fabrication facilities for the latest chip generation doubles every four years.
Correct Answer
A. Rick’s Law
10.
____ is a generic term for describing secondary storage data transfer units.
Correct Answer
D. Block
Explanation
Block is the correct answer because it is a generic term used to describe secondary storage data transfer units. A block is a fixed-size unit of data that is used for storage and retrieval operations. It is commonly used in file systems and databases to organize and manage data on secondary storage devices such as hard drives. Blocks are typically of a fixed size, which allows for efficient storage and retrieval operations.
11.
____ stores each bit by using a single transistor and capacitor.
Correct Answer
C. Dynamic RAM
Explanation
Dynamic RAM (DRAM) stores each bit by using a single transistor and capacitor. In DRAM, the capacitor holds the charge to represent a bit of information, while the transistor acts as a switch to control the flow of charge in and out of the capacitor. This design allows for high storage density and lower cost compared to other memory technologies. However, DRAM requires constant refreshing of the charge in the capacitors, which can result in slower access times compared to static RAM (SRAM).
12.
The ratio of cache hits to read accesses is called the cache’s ____.
Correct Answer
A. Hit ratio
Explanation
The ratio of cache hits to read accesses is known as the hit ratio. This metric measures the effectiveness of a cache in retrieving requested data without needing to access the main memory. A higher hit ratio indicates that a larger proportion of read accesses are successfully retrieved from the cache, resulting in improved performance and efficiency.
13.
____ sensors capture input from special-purpose symbols placed on paper or the flat surfaces of 3D objects.
Correct Answer
C. Mark and pattern
Explanation
Mark and pattern sensors capture input from special-purpose symbols placed on paper or the flat surfaces of 3D objects. These sensors are designed to detect and interpret specific marks or patterns that are unique to each symbol. By capturing and analyzing these marks or patterns, the sensors can accurately interpret the input and provide the necessary information or response. This technology is commonly used in applications such as optical character recognition (OCR) or barcode scanning, where specific marks or patterns need to be recognized and processed.
14.
PDF417 bar codes can hold around ____ of data.
Correct Answer
A. 1 KB
Explanation
PDF417 bar codes can hold around 1 KB of data. This means that the bar code has the capacity to store approximately 1 kilobyte of information. Kilobyte is a unit of digital information that is equal to 1,024 bytes. Therefore, the PDF417 bar code is capable of storing a significant amount of data in a compact format.
15.
A(n) ____ is the maximum number of bits or bytes per second that the channel can carry.
Correct Answer
D. Raw data transfer rate
Explanation
The raw data transfer rate refers to the maximum number of bits or bytes per second that the channel can carry. This rate represents the total amount of data that can be transmitted without accounting for any additional factors such as error correction or protocol overhead. It is the maximum capacity of the channel and does not take into consideration any limitations or constraints.
16.
As bit transmission speed is increased, the duration of each bit in the signal, known as the ____, decreases.
Correct Answer
A. Bit time
Explanation
As the bit transmission speed increases, the duration of each bit in the signal, known as the bit time, decreases. This means that each bit is transmitted in a shorter amount of time, allowing for more bits to be transmitted within a given time frame. This increase in speed is achieved by reducing the time interval between each bit, resulting in a decrease in the duration of each individual bit.
17.
A(n) ____ extracts the data embedded in the signal it receives and retransmits a new signalcontaining the same data.
Correct Answer
A. Repeater
Explanation
A repeater is a device that receives a signal and extracts the data embedded in it. It then retransmits a new signal containing the same data. This allows the signal to be transmitted over longer distances without losing its integrity. A repeater does not alter or modify the data in any way, it simply amplifies and retransmits it.
18.
The ____ standard divides frequency bands in the 5.2, 5.7, and 5.8 GHz ranges into 12 channels.
Correct Answer
D. 802.11a
Explanation
The 802.11a standard divides frequency bands in the 5.2, 5.7, and 5.8 GHz ranges into 12 channels. This standard, also known as Wi-Fi 4, was the first to use the 5 GHz frequency band for wireless communication. It provides faster data transfer rates compared to the 802.11b and 802.11g standards, which operate in the 2.4 GHz frequency band. Therefore, 802.11a is the correct answer as it specifically mentions the frequency ranges and the number of channels.
19.
The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
Correct Answer
B. Network topology
Explanation
Network topology refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another. It defines the layout of a network, including how devices are connected and the paths that data takes to travel between them. This includes the arrangement of nodes, such as routers, switches, and computers, as well as the connections and protocols used to transmit data. Network topology is essential for understanding and managing a network's structure and performance.
20.
The ____ layer includes communication protocols used by programs that make and respond to high-level requests for network services.
Correct Answer
D. Application
Explanation
The application layer includes communication protocols used by programs that make and respond to high-level requests for network services. This layer is responsible for providing services such as email, file transfer, and remote login. It enables applications to access the network and communicate with other devices.
21.
The ____ layer forwards messages to their correct destinations.
Correct Answer
C. Network
Explanation
The Network layer is responsible for forwarding messages to their correct destinations. This layer is responsible for routing and addressing, ensuring that data packets are properly directed through the network to reach their intended destination. It determines the best path for data transmission and handles any necessary protocols for addressing and routing.
22.
The ____ layer is the interface between network software and hardware.
Correct Answer
B. Data link
Explanation
The data link layer serves as the intermediary between network software and hardware. It is responsible for transmitting data over the physical network and ensuring error-free and reliable delivery. This layer establishes and terminates connections between devices, manages data flow control, and handles error detection and correction. By providing a standardized interface, the data link layer allows network software to communicate with the underlying hardware efficiently and effectively.
23.
IP accepts messages called ____ from Transport-layer protocols and forwards them to theirdestination.
Correct Answer
A. Datagrams
Explanation
IP accepts messages called datagrams from Transport-layer protocols and forwards them to their destination. A datagram is a self-contained unit of data that includes the source and destination IP addresses, as well as the payload data. IP uses the destination IP address to determine the appropriate route for forwarding the datagram to its destination. This process is crucial for the functioning of the internet, as it allows for the efficient and reliable transmission of data across different networks.
24.
The written format of 128-bit IP addresses is called ____ notation.
Correct Answer
D. Colon hexadecimal
Explanation
The written format of 128-bit IP addresses is called colon hexadecimal notation because it uses colons to separate the 16-bit blocks of the address and represents each block using a hexadecimal number, which is a base-16 numbering system. This notation is commonly used in IPv6 addresses, which have a larger address space compared to IPv4 addresses. The colon hexadecimal notation allows for a larger number of unique IP addresses to be represented and is necessary to accommodate the growing number of devices connected to the internet.
25.
At the sending node, the ____ layer’s role is to translate IP datagrams into a format that can be transported and forwarded over a specific physical network.
Correct Answer
B. Network Interface
Explanation
The correct answer is Network Interface. At the sending node, the Network Interface layer is responsible for translating IP datagrams into a format that can be transported and forwarded over a specific physical network. This layer handles tasks such as encapsulating the IP datagrams into frames, adding necessary headers and trailers, and ensuring the data is properly formatted for transmission over the physical network.
26.
____ perform design activities to create models that produce an architectural blueprint for system implementation.
Correct Answer
A. System developers
Explanation
System developers perform design activities to create models that produce an architectural blueprint for system implementation. They are responsible for designing and building the software components of a system, ensuring that it meets the requirements and objectives set by the system architects. System developers work closely with system architects to understand the system's design and translate it into functional code. They play a crucial role in the development process by creating the necessary models and blueprints that guide the implementation of the system.
27.
The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.
Correct Answer
A. Instruction explosion
Explanation
The term "instruction explosion" refers to the one-to-many relationship between later-generation programming statements and the CPU actions that implement them. This means that a single programming statement can result in multiple CPU actions being executed.
28.
A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.
Correct Answer
C. Third-generation language
Explanation
A third-generation language uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1. These languages are high-level programming languages that were developed to be more user-friendly and closer to human language, making them easier to read and write compared to lower-level languages. They also provide more abstraction and automation, allowing programmers to focus more on solving problems rather than managing hardware details. Examples of third-generation languages include C, Java, Python, and Ruby.
29.
A ____ is a source code instruction that controls the execution of other source code instructions.
Correct Answer
B. Control structure
Explanation
A control structure is a source code instruction that controls the execution of other source code instructions. It determines the flow of the program by making decisions or repeating certain instructions based on certain conditions. Control structures include if statements, loops, and switch statements, among others. These structures allow the programmer to control the order in which instructions are executed and make the program more efficient and flexible.
30.
____ linking is performed during program loading or execution.
Correct Answer
A. Dynamic
Explanation
Dynamic linking is performed during program loading or execution. This means that the necessary libraries and functions are linked to the program at runtime, allowing for flexibility and modularity. This type of linking allows multiple programs to share the same code, reducing redundancy and improving efficiency. Additionally, dynamic linking enables the program to adapt to changes in the system environment, making it more versatile and adaptable.
31.
Threads in the ____ are idle, pending availability of a CPU.
Correct Answer
A. Ready state
Explanation
Threads in the ready state are idle and waiting for the availability of a CPU. In this state, the threads are prepared to execute and are waiting for the scheduler to allocate a CPU to them. Once a CPU becomes available, the threads in the ready state transition to the run state and start executing their tasks. Therefore, the ready state is the correct answer as it accurately describes the situation where threads are idle and waiting for CPU availability.
32.
The OS maintains a ____ and updates it each time a partition is allocated or freed.
Correct Answer
B. Memory partition table
Explanation
The OS maintains a memory partition table and updates it each time a partition is allocated or freed. This table keeps track of the status and availability of each memory partition in the system. It helps the OS efficiently manage and allocate memory to different processes, ensuring that memory is utilized optimally and preventing conflicts or overlaps.
33.
In virtual memory management, a ____ is a small fixed-size portion of a program, normally between 1 and 4 KB.
Correct Answer
B. Page
Explanation
In virtual memory management, a page is a small fixed-size portion of a program, normally between 1 and 4 KB. Pages are used to divide a program into smaller, manageable units that can be loaded into and out of the main memory as needed. This allows for efficient memory allocation and utilization, as well as the ability to handle larger programs that may not fit entirely in the physical memory.
34.
A reference to a page held in memory is called a ____.
Correct Answer
A. Page hit
Explanation
A reference to a page held in memory is called a page hit because it indicates that the requested page is already present in the memory, resulting in a faster retrieval time.
35.
The CPU maintains a ____ containing descriptors for all memory segments.
Correct Answer
D. Global descriptor table
Explanation
The CPU maintains a global descriptor table containing descriptors for all memory segments. This table is used to store information about the memory segments, such as their base address, limit, and access permissions. It allows the CPU to efficiently manage and access different memory segments during program execution. The local descriptor table, page allocation table, and global definition table are not used for this purpose.
36.
A ____ is the unit of storage transferred between the device controller and memory in a single operation.
Correct Answer
B. pHysical record
Explanation
A physical record is the unit of storage transferred between the device controller and memory in a single operation. This means that when data is being transferred between the device controller and memory, it is done in chunks of physical records. These physical records represent a specific amount of data that can be moved at once, making the transfer process more efficient.
37.
Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
Correct Answer
A. Protocol stack
Explanation
A software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a "protocol stack". This term refers to the collection of protocols and software components that work together to enable communication between different devices and networks using the TCP/IP protocol suite. The protocol stack ensures that data is properly encapsulated, transmitted, and received across the network, allowing for reliable and efficient communication.
38.
In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.
Correct Answer
B. Local resource registry
Explanation
In static resource connections, the resource locator maintains a local resource registry containing the names and locations of known resources and services. This registry allows the resource locator to easily access and retrieve the necessary resources without having to search for them every time. It acts as a centralized database of all the available local resources, making the process of resource management more efficient and streamlined.
39.
All objects in an LDAP schema have a(n) ____ attribute.
Correct Answer
B. Distinguished name
Explanation
All objects in an LDAP schema have a distinguished name attribute. The distinguished name is a unique identifier for each object in the directory. It consists of a series of attribute-value pairs that specify the object's location within the directory tree structure. The distinguished name helps to uniquely identify and locate objects within the LDAP directory.
40.
Active Directory clients rely on a ____ to locate Active Directory servers.
Correct Answer
D. DNS server
Explanation
Active Directory clients rely on a DNS server to locate Active Directory servers. DNS (Domain Name System) is a network protocol that translates domain names into IP addresses. In the case of Active Directory, the DNS server holds the information about the location of Active Directory servers, allowing clients to find and connect to them. The DNS server plays a crucial role in the overall functioning of Active Directory by providing the necessary information for client-server communication.
41.
With the ____ protocol, a process on one machine can call a process on another machine.
Correct Answer
B. Remote Procedure Call
Explanation
The Remote Procedure Call (RPC) protocol allows a process on one machine to invoke a process on another machine. It provides a mechanism for inter-process communication between different machines in a network. Through RPC, a program can execute a function or procedure on a remote machine as if it were running locally. This enables distributed computing and facilitates the development of client-server applications where the client can request services from a server located on a different machine.
42.
In DCE, the security server issues security “____” to each party that are exchanged to verify identities.
Correct Answer
D. Tickets
Explanation
In DCE (Distributed Computing Environment), the security server issues security "tickets" to each party. These tickets are then exchanged between parties to verify their identities. This ensures that only authorized parties are granted access to the system and prevents unauthorized access or impersonation.
43.
____ is a collection of resources that can be accessed over the Internet by standard protocols, such as Hypertext Transfer Protocol (HTTP).
Correct Answer
C. The World Wide Web
Explanation
The World Wide Web is a collection of resources that can be accessed over the Internet by standard protocols, such as Hypertext Transfer Protocol (HTTP). It is a global system of interconnected documents and other resources, linked by hyperlinks and URLs. The World Wide Web is a key component of the Internet and allows users to navigate and interact with information and websites through web browsers.
44.
____ specifies the middleware objects use to interact across networks.
Correct Answer
D. CORBA
Explanation
CORBA (Common Object Request Broker Architecture) is a middleware technology that allows objects to interact across networks. It provides a standardized way for objects to communicate and invoke methods on remote objects, regardless of the programming language or platform they are implemented in. CORBA uses an Object Request Broker (ORB) to handle the communication between objects, enabling seamless interoperability between different systems and applications. Therefore, CORBA is the correct answer as it specifies the middleware objects use to interact across networks.
45.
____ is a key supporting technology in IaaS because it enables a customer/user to configureapplication and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.
Correct Answer
A. Hardware virtualization
Explanation
Hardware virtualization is a key supporting technology in IaaS because it allows customers/users to configure and deploy virtual servers on a third-party hosting site. By using hardware virtualization, customers can create virtual instances of servers, which are independent of the underlying physical hardware. This enables flexibility and scalability as virtual servers can be easily provisioned and managed, and it also allows for better resource utilization as multiple virtual servers can run on a single physical server.
46.
____ are assets or resources expected to provide benefits beyond the current fiscal year.
Correct Answer
D. Capital resources
Explanation
Capital resources are assets or resources that are expected to provide benefits beyond the current fiscal year. These resources are typically long-term investments that are used to generate income or support the operations of a business or organization. Examples of capital resources include land, buildings, machinery, equipment, and vehicles. These assets are not consumed or used up in the normal course of business operations, but rather, they are expected to provide ongoing benefits and value over an extended period of time.
47.
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
Correct Answer
B. Application software
Explanation
The starting point for determining hardware requirements is the application software that will run on the hardware platform. This is because different applications have different resource requirements, such as processing power, memory, and storage. Therefore, understanding the needs of the application software is crucial in order to select the appropriate hardware that can support its requirements effectively.
48.
A ____ is a measure of computer system performance while executing one or more processing tasks.
Correct Answer
A. Benchmark
Explanation
A benchmark is a measure of computer system performance while executing one or more processing tasks. It is used to evaluate and compare the performance of different computer systems or software. By running standardized tests, benchmarks provide a quantitative measure of a system's capabilities and help identify areas for improvement.
49.
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
Correct Answer
C. Software monitor
Explanation
A software monitor is a program typically embedded in OS service routines that detects and reports processing activity or requests. This tool is designed to keep track of the performance and behavior of software applications running on a system. It helps identify any issues or bottlenecks in the software by monitoring its activity and generating reports.
50.
A ____ describes the resource or service utilization of an application program during execution.
Correct Answer
B. Program profiler
Explanation
A program profiler is a tool used to measure and analyze the resource or service utilization of an application program while it is running. It helps developers identify performance bottlenecks, memory leaks, and other issues that may affect the program's efficiency and responsiveness. By providing detailed insights into the program's execution, a program profiler enables developers to optimize their code and improve the overall performance of the application.