- •It must run without some of the protection mechanisms that guard against faulty instructions or illegal memory accesses.
- •Interrupt handlers have read-write access to the data an application stores in the registers
- •Vector graphics
- •It is an example of a code review
- •Integrated Development Environment
- •Identify the type of email attachment so a suitable program can be used to open the attachmen
- •Is assigned to a computer and may change the next time the computer connects to the network
- •Intrusion detection system
1. |
|
Which of the following can supply input to a computer?
|
|
|
2. |
|
Which of the following is (are) true about computers?
|
|
|
3. |
|
A computer processes data in a device called the |
|
CСPU |
|
|
|
|
|
4. |
|
Computers that operate in essentially the same way are said to be |
|
|
|
|
|
|
compatible
|
5. |
|
A computer file is a named collection of data that exists on which of the following?
Customer Relationship Management software
ADA
MP3
Integrated circuits
None
Integrated circuits
Punched cards
2
0000, 0001, 0010, 0011
01100001
2^20
CMOS
instruction set
Celeron
CMOS
100,000,000
Monitoring the operation of an automobile engine
Intel
It cannot be determined whether program P will run faster on computer A or on computer B without knowing more about program P.
a constant source of electrical power
compactness
AGP
hertz, Bps
USB
pumped
PCMCIA
CRT
printer
Ink-jet and laser printers have a similar cost per printed page when printing large quantities of pages
Front side
cache
A copy of the document is loaded from the disk into RAM and edited in RAM.
The hard disk read/write head rides on a cushion of air
SecureDigital card
4.7GB
Tracks can be recorded on both sides of a DVD
Solid state storage medium
CD-Rs can be read from and written to many times
Flash memory
Video Card
Request latency
Profiling tools
402 seconds
40 seconds
Cache
Throughput
The time required to complete an individual operation
Data expands to fill the space available
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
79. |
|
Which of the following statements is true? |
|
CMOS memory is volatile.
|
80. |
|
Which of the following best describes preemptive multitasking? |
|
A real-time clock generates interrupts during which other processes may be executed.
|
81. |
|
Which of the following correctly represents the layers of software in a computer system (from lowest level to highest level of abstraction)? |
|
BIOS, Operating System, Application Program Interface, Runtime Library, Application, User Interface
|
82. |
|
Which of the following is not part of the Power-On Self Test sequence? |
|
Assign IP addresses to dialup interfaces
|
83. |
|
Which UNIX command is used to view process information? |
|
top
|
84. |
|
Which of the following best describes the run queue? |
|
List of runnable processes
|
85. |
|
When booting a computer, the following message is displayed: “Non-system disk or disk error. Replace and strike any key when ready.” This usually implies that: |
|
The BIOS tried to load the boot loader from a disk that does not contain one
|
86. |
|
Which of the following secures files stored on the hard disk of a computer? |
|
Changing the boot order to boot from the hard disk drive before any removable media
|
87. |
|
Which of the following deals directly with the signals that control each hardware component? |
|
Basic Input/Output System
|
88. |
|
Why is the kernel of an operating system kept as small as possible? |
|
It must run without some of the protection mechanisms that guard against faulty instructions or illegal memory accesses.
|
89. |
|
Which of the following is used to manage files and folders on the disk? |
|
File system
|
90. |
|
Which of the following scenarios is invalid for a system with a single CPU/core? |
|
One blocked process, multiple running processes
91. |
|
How can the date, time, and currency formats be customized? |
|
Using the Regional Settings applet in the Control Panel
|
92. |
|
Which of the following statements is true? |
|
Interrupt handlers have read-write access to the data an application stores in the registers
|
93. |
|
Device driver configuration can be changed using: |
|
|
(a) All of the above (b) Control Panel Applets (c) Registry Editor (d) Device Manager |
|
94. |
|
Which of the following operations cause(s) a fault to occur?
|
|
|
95. |
|
A trap is triggered by |
|
the execution of processor instructions
|
96. |
|
When an interrupt is being handled |
|
A higher priority interrupt can occur
|
97. |
|
The UNIX operating system stores configuration information in: |
|
Text files
98. |
|
The part of the operating system that maintains a queue of print requests is called a: |
|
Print server
|
99. |
|
Which of the following permissions is required to view the contents of a directory? |
|
Execute access
|
100. |
|
Which of the following statements about virtual memory is false? |
|
Physical memory allocated for a program needs to be contiguous
|
101. |
|
Which of the following statements is true? |
|
Hardware has to be designed to support memory virtualization.
|
102. |
|
Which of the following statements is true? |
|
Relocation can keep a part of the address space of a program in the RAM and the remaining address space on disk
|
103. |
|
Which of the following are true regarding the use of virtual memory in a computer system?
4 GB
Names must be unique within that parent folder
NTFS
The file extension
8 characters followed by a dot and a 3 character file extension
Updating the data via the shortcut updates the target file
2 GB
Partitioning the drive into partitions of size 2 GB or less
More efficient use of space due to smaller cluster size
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
116. |
|
Which license type is recommended for a university campus? |
|
Site License
|
117. |
|
Which of the following is not considered software? |
|
|
(a) Geographical information software (b) MS Word documents (c) None of the above (d) Device drivers |
|
118. |
|
Shareware licenses enable a user to: |
|
Copy and distribute the software
|
119. |
|
Which of the following is an example of application software? |
|
Word processing software
120. |
|
Which of the following applications, if integrated with an email client application, would provide the greatest convenience to a user? |
|
An address book application
|
121. |
|
Which of the following are filled by lines and shapes and are suitable for corporate logos, schematics etc. |
|