Untitled Document PDF Past Paper
Document Details
Uploaded by Deleted User
Tags
Summary
This document is a computer science past paper covering various topics related to computer concepts, including data storage, operating systems, and communication protocols. The document contains multiple-choice questions.
Full Transcript
QUESTION 1 Nearly all data in the computer is stored and retrieved as files. a. True b. False QUESTION 2 Random access files are the same as relative access files. a. True b. False QUESTION 3 A port is simply a connector at the end of a bus into which a device can be plugged. a. True b. Fals...
QUESTION 1 Nearly all data in the computer is stored and retrieved as files. a. True b. False QUESTION 2 Random access files are the same as relative access files. a. True b. False QUESTION 3 A port is simply a connector at the end of a bus into which a device can be plugged. a. True b. False QUESTION 4 The user services provided by an operating system generally includes retrieval, storage, and manipulation of files. a. True b. False QUESTION 5 The user services provided by an operating system generally includes user 1/O services. a. True b. False QUESTION 6 Something as simple as a household appliance can have an operating system. a. True b. False QUESTION 7 The operating system provides file system access and file support services. a. True b. False QUESTION 8 The operating system provides I/O support services that can be used by every program. a. True b. False QUESTION 9 When analog data is converted into digital form, however, a small amount of information is lost during the transformation. a. True b. False QUESTION 10 The wiring on the motherboard interconnects all of the peripheral cards that are plugged in to connectors, together with circuitry that steers 1/O to the CPU and memory. This arrangement is known as a: a. Backbone b. Backplane c. Bus d. CPU arrangement QUESTION 11 A channel that carries messages in only one direction is known as a duplex channel. a. True b. False QUESTION 12 A full-duplex channel may carry messages in both directions, but only one direction at a time. a. True b. False QUESTION 13 Channels which carry signals simultaneously in both directions are called diuble-sided channels, a. True b. False QUESTION 14 In a active hub, all of the connections at the hub are simply tied together inside the hub and the hub performs no operation or modification of the signals as they arrive at the hub a. True b. False QUESTION 15 An Intranet is an organizational network, where the user interfaces and applications are based primarily on Web services. a. True b. False QUESTION 16 Ethernet is an example of Data Link Layer implementation. a. True b. False QUESTION 17 Port numbers can be modified by an application. a. True b. False QUESTION 18 There must be a way to break long messages into smaller units. These units are called bunches a) True b) False QUESTION 19 The use of packets simplifies operations and increases communication efficiency. a) True b) False QUESTION 20 Channels can be made up of multiple links. a) True b) False QUESTION 21 Bit rate and bandwidth are used interchangeably. a) True b) False QUESTION 22 Packet switching is also called datagram switching. a. True b. False QUESTION 23 Multimedia Input is a type of computer peripheral that may include video and audio input. a. True b. False QUESTION 24 With client-server computing, the client and server must be on separate computers. a. True b. False QUESTION 25 The computers in a cluster must be in close proximity. a. True b. False QUESTION 26 Clustering is used to increase the available computing power by combining the power of the individual systems. a. False b. True QUESTION 27 Which of the following multiplexing techniques is normally used with digital signals? a. Time division multiplexing (TDM) b. Frequency division multiplexing (FDM) c. Amplitude division multiplexing (ADM) d. Phase division multiplexing (PDM) QUESTION 28 The following are computers mounted on a board similar to a motherboard that can be plugged into connectors on a rack. a. Blade servers b. Clusters c. Plug-and-play computers d. Miniature computers QUESTION 29 Which of the following is FALSE regarding fiber-optic cabling? a. Attenuation is very low. b. It is vulnerable to most forms of noise. c. A laser or light-emitting diode is used as the light source. d. Each strand is thinner than a human hair and may be tens or hundreds of miles long. QUESTION 30 Abbreviated Hz, is the unit used to measure what? a. Noise b. Velocity c. Amplitude d. Frequency QUESTION 31 Thunderbolt is designed to support a data transfer rate of up to how many gigabits per second in each direction? a. 10 b. 50 c. 100 d. 1000 QUESTION 32 Specific device control is built into a controller within some devices and into the computer software programs that control 1/0 from these devices. These programs are called what? a. Device controller b. Device driver c. Device port d. Device peripheral QUESTION 33 In most computer systems, the CPU, memory, and other major components are mounted to wiring on a printed circuit board known as a what? a. Circuit plane b. Motherboard c. Adapter board d. Peripheral board QUESTION 34 Internet Control Message Protocol creates messages for failure at which of the following layers? a. Physical layer b. Network layer c. Data Link layer d. Session layer QUESTION 35 To solve the related problems of channel availability and maximum utilization, there must be a way to break long messages into smaller units. These units are called what? a. Boxes b. Packets c. Envelopes d. Containers QUESTION 36 The typical communication channel is actually divided into segments; connections along the segments are called what? a. Links b. Routes c. Dedicated paths d. Transmission paths QUESTION 37 A relatively small number of standard protocols, consisting primarily of the communication requirements for modern data communication networks a. TCP/IP and UDP b. TCP/IP and BGP c. TCP/IP and ATM d. TCP/IP and Ethernet- protocol suites, satisfy nearly all of the QUESTION 38 TCP establishes a connection at the request of a network application. To initiate a connection, TCP sends a control packet to TCP at the Web site, requesting a connection; this results in a brief back-and-forth series of requests and acknowledgments known as what? a. Binding b. Collaborating c. Handshaking d. Service handling QUESTION 39 What is the abbreviation for the protocol that translates domain names into IP addresses? a. NAT b. UDP c. DIS d. DHCP QUESTION 40 Protecting the content of data communication against changes is known as what? a. Integrity b. Encryption c. Confidentiality d. Authentication QUESTION 41 Reading data in all the packets as they pass through the network is known as what? a. Packet sniffing b. Switch tapping c. Packet spoofing d. Packet cracking QUESTION 42 The dialogue between two cooperating applications or processes at the ends of the communication link on the OSI model is known as a what? a. Session b. Connection c. Communications link d. Time-sensitive service QUESTION 43 To achieve better load-balancing we may use the following configuration for clusters: a. Share Nothing model b. Share Disk model c. Share All model d. None of the Above QUESTION 44 Controlling the channel bandwidth to prevent interface from other signals is referred to as: a. Cleansing b. Clearing c. Cleaning d. Filtering QUESTION 45 Which of the following is a basic service that the operating system provides? a. Manages, loads, and executes programs b. Accepts and processes commands from user c. Manages the hardware resources of the computer d. All of the above QUESTION 46 Which operating system function is responsible for deallocating a program's memory when it has completed execution? a. Memory management b. The file management system c. The input/output control system d. Network management, communication support, and communication interfaces QUESTION 47 Which user service is responsible for determining the amount of available disk space, the amount of available memory, and the number of users on the system? a. File Management System b. Disk and other 1/O Device Services c. Security and Data Integrity Protection d. System Status Information and User Administration QUESTION 48 Which user service is responsible for mounting and unmounting devices? a. File Management System b. Disk and other I/O Device Services c. Security and Data Integrity Protection d. System Status Information and User Administration QUESTION 49 Which of the following are functions that are performed by a program rather than by a user? a. Open a file and create a file pointer b. Read a number of bytes from a file c. Move the file pointer a number of bytes a distance forward or backward d. All of the above QUESTION 50 Records of data files may be retrieved using the following method: a. Sequential Access Method b. Random Access Method c. Both (a) and (b) d. Neither (a) nor (b)