15
1 Q1: Choose the correct answer: 1) Intel Pentium CPU is a _____________. a) RISC based b) CISC based c) a &b d)neither a nor b 2) The bus which is used to transfer data from main memory to peripheral device is called _____________. a) DMA bus b) Output bus c) Data bus d)a, b & c 3) Micro instructions are stored in_____________. a) primary storage b) secondary storage c) cache memory d) control memory 4) The bus which is used to transfer data from main memory to peripheral device is_____________. a) Data bus b) DMA bus c) Input bus d) Output bus 5) the register pair which can be directly stored in memory is ___________. a) CD b) HI c) BC d) DE 6) The word length of a CPU is defined as _____________. a) The maximum addressable memory size b) The width of a CPU register c) The width of the address bus d) The number of general purpose CPU registers 7) In which addressing mode the operand is given explicitly in the instruction a) Absolute b) Indirect c) Direct d) Immediate 8) The addressing mode used in the instruction PUSH B is _____________. a) Direct b) Register c) Register indirect d) Immediate

Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

Embed Size (px)

Citation preview

Page 1: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

1

Q1: Choose the correct answer: 1) Intel Pentium CPU is a _____________.

a) RISC based

b) CISC based

c) a &b

d)neither a nor b

2) The bus which is used to transfer data from main memory to peripheral device is

called _____________.

a) DMA bus

b) Output bus

c) Data bus

d)a, b & c

3) Micro instructions are stored in_____________.

a) primary storage

b) secondary storage

c) cache memory

d) control memory

4) The bus which is used to transfer data from main memory to peripheral device

is_____________.

a) Data bus

b) DMA bus

c) Input bus

d) Output bus

5) the register pair which can be directly stored in memory is ___________.

a) CD

b) HI

c) BC

d) DE

6) The word length of a CPU is defined as _____________.

a) The maximum addressable memory size

b) The width of a CPU register

c) The width of the address bus

d) The number of general purpose CPU registers

7) In which addressing mode the operand is given explicitly in the instruction

a) Absolute

b) Indirect

c) Direct

d) Immediate

8) The addressing mode used in the instruction PUSH B is _____________.

a) Direct

b) Register

c) Register indirect

d) Immediate

Page 2: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

2

Q2: Define cache and explain its main usage purpose and advantages.

Page 3: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

3

Q3:Choose the correct answer: 1. Database is an organized collection of ----------- and its purpose is to provide user

with an abstract view of --------.

a) Information, knowledge

b) Data, data

c) Information, data

d) Data, knowledge

2. ---------level describe what data are stored in database, and -------- level describe

only part of the entire database.

a) Physical, view

b) Logical, view

c) View, logical

d) View, physical

3. 1‐to‐many relationship is found in -----------model

a) Relational

b) Object

c) Network

d) Hierarchical

4. ---------- database systems improve processing and I/O speed by using multiple

CPUs and Disks.

a) Centralized

b) Client-Server

c) Parallel

d) Distribute

5. The E-R model developed in order to ……….

a) Facilitate the overall physical structure of DB.

b) Facilitate the overall logical structure of DB.

c) Facilitate the overall users views structure of DB.

d) Facilitate DB design scheme.

6. In network database model the data is organized as a --------

a) Tree

b) Tables

c) Flowchart

d) None of the above

7. --------- is used for retrieving and storing data

a) DDL

b) DDR

c) DML

d) None of the above

Page 4: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

4

Q4. A# Explain the database security.

Q4. B# Explain the advantage of DBMS.

Page 5: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

5

Q5: Choose the correct answer:

1.The operating system is designedmostly for ease of use, with some attention paid to

performance and nonepaid to ------.

a.resource utilization

b. the cost

c.speed

d. accuracy

2. The operating system is the one program runningat all times on the computer

(usually called the --------).

a. kernel.

b. boss.

c. collaborative system.

d. center.

3. That clusteredcomputers share storage and are closely linked via a ----.

a. WAN

b. LAN

c. MAN

d. all of the above

4. ------is a software-generated interrupt causedeither by an error (for example,

division by zero or invalid memory access)or by a specific request from a user

program that an operating-system servicebe performed.

a. compiler

b. trap

c. interpreter

d. linker

5. Embedded systems almost always run ------- operating systems.

a. run-time.

b. meta data.

c. real-time.

d. parallel.

6. ------ include personal digital assistants (PDAs), such as Palmand Pocket-PCs, and

cellular telephones.

a. hand land systems

b. transparency systems

c.handheld systems

d. data accuracy systems.

7. On systems with multiple command interpretersto choose from, the interpreters are

known as -------.

a. bottle neck

b. cut off

c. interpreter

d.shells

Page 6: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

6

Q6: Draw the multistep processing of a user program.

Page 7: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

7

Q7: Choose the correct answer:

1- The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack

scripts.

A) Malware

B) Spam

C) Phish

D) Virus

2- A hacker that changes or forges information in an electronic resource is engaging in

__________.

A) Denial of service

B) Sniffing

C) Terrorism

D) Data diddling

3-The __________ of a threat measures its potential impact on a system.

A) Vulnerabilities

B) Countermeasures

C) Degree of harm

D) Susceptibility

4- Which of the following Algorithms belong to symmetric encryption?

A) 3DES (TripleDES)

B) RSA

C) RC5

D) IDEA

5- Which is the largest disadvantage of the symmetric Encryption?

A) More complex and therefore more time-consuming calculations

B) Problem of the secure transmission of the Secret Key.

C) Less secure encryption function.

D) Isn't used any more

6- Which of the following statements are correct?

A) PGP uses asymmetric encryption.

B) In the World Wide Web, primarily symmetric Encryption is used

C) Symmetric encryption is applied in the transmission of PIN numbers from the EC automat to

the server of the bank for example.

D) PGP uses combined encryption

Page 8: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

8

7- The DES function has _______ components.

A) 2

B) 3

C) 4

D) 5

8- _______ DES was designed to increase the size of the DES key

A) Double

B) Triple

C) Quadruple

D) None of the above

Q8: Describe the key generator in serpent block cipher algorithm.

Page 9: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

9

Q9: Choose the correct answer:

1. Two main measures for the efficiency of an algorithm are?

a. Processor and memory

b. Complexity and capacity

c. Time and space

d. Data and space

2. The time factor when determining the efficiency of algorithm is measured by?

a. Counting microsecond's

b. Counting the number of key operations

c. Counting the number of statements

d.Counting the kilobytes of algorithm

3. The space factor when determining the efficiency of algorithm is measured by?

a. Counting the maximum memory needed by the algorithm

b. Counting the minimum memory needed by the algorithm

c. Counting the average memory needed by the algorithm

d. Counting the maximum disk space needed by the algorithm

4. Which of the following case does not exist in complexity theory?

a. Best case

b. Worst case

c. Average case

d. Null case

5. The Worst case occur in linear search algorithm when?

a. Item is somewhere in the middle of the array

b. Item is not in the array at all

c. Item is the last element in the array

d. Item is the last element in the array or is not there at all

6. The Average case occurs in linear search algorithm?

a. When Item is somewhere in the middle of the array

b. When Item is not in the array at all.

c. When Item is the last element in the array

d. When Item is the last element in the array or is not there at all

7. The complexity of the average case of an algorithm is?

a. Much more complicated to analyze than that of worst case

b. Much more simpler to analyze than that of worst case

c. Sometimes more complicated and some other times simpler than that of worst case

d. None or above

8. The complexity of linear search algorithm is?

a. O(n)

b. O(log n)

c. O(n2)

d. O(n log n)

Page 10: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

10

Q10: Answer the following questions in details?

a. Which sorting algorithm is considered the fastest?

b. Briefly explain recursive algorithm?

Page 11: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

11

Q11: Choose the correct answer: 1. An intermediate code form is

A. Postfix notation

B. Syntax trees

C. Three address code

D. All of these

2. Which of the following actions an operator precedence parser may take to recover

from an error ?

A. Insert symbols onto the stack

B. Delete symbols from the stack

C. Insert or delete symbols from the input

D. All of the above

3. The output of lexical analyzer is

A. A set of regular expressions

B. Syntax tree

C. Set of tokens

D. Strings of character

4. Which of the following is used for grouping of characters into tokens?

A. Parser

B. Code optimization

C. Code generator

D. Lexical analyzer

5. Shift reduce parsers are

A. Top down parser

B. Bottom up parser

C. May be top down or bottom up parser

D. None of the above

6. A garbage is

A. Unallocated storage

B. Allocated storage with all access paths to it destroyed

C. Allocated storage

D. Uninitialized storage

Page 12: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

12

7. A bottom up parser generates

A. Right most derivation

B. Right most derivation in reverse

C. Left most derivation

D. Left most derivation in reverse

Q12: Explain and draw the main phases of compiler designing process.

Page 13: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

31

Q13: Choose the correct answer:

1-

(a) e -3lnx =3x, (b) e -3lnx =3

1

x, (c) e -3lnx =

x3

1 .

2- If f(x) is Fourier cosine Half-range series this function defined as:-

(a) f(x)= a0 +

1n

(an cos

n x+ bn

nsin x),

(b) f(x)= a0 +

1n

( bn

nsin x), ( C )f(x)= a0 +

1n

(an cos

n x),

Where T is period function on interval – T < x < T.

3- The solution of following differential equation [ y˝ +4y = 0] is………

(a) y= c1 cos4x + c2 sin4x, (b) y= c1 cosx + c2 sinx,

(c)y= c1 cos2x + c2 sin2x.

4- The solution of following differential equation [ y΄= 1] is………

cxyccx

ybcxya 22

),2

),)

5- f(x) is even function if defined as:

(1) f (-x) = -f(x), (2) f(x) = f (-x), ( 3) -f (x) = f(x),

6- If [3

1)(

ssf ], the inverse of Laplace transformation [f (t) = }

1{

3

1

sL ] is……

2),6),)

234 t

ctbta

7- If [W = f(x, y, z)]. Then the total differential of this function is defined as:

(a) dw =x

f

x

w

+ y

f

y

w

+z

f

z

w

, (b) dw =wx

f

+ wy

f

+wz

f

,

(c) dw =x

f

dx + y

f

dy +z

f

dz.

8- 29

1

x

dx is …………. ………

,3cos),)3

(sin),)9

(sin) 111 cxccx

bcx

a

Q14: If [f (t) = iwte ]. Then find Laplace transformation [f(s) = L { iwt

e }]

Page 14: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

14

Q15: Choose the correct answer :

1- What is state space?

(a) The whole problem

(b) Your definition to a problem

(c) Problem you design

(d) Representing your problem with variable and parameter

2- A* algorithm is based on:

(a) Breadth-First search

(b) Depth-First search

(c) Best-First search

(d) Hill climbing

3- In a rule based system, procedural domain knowledge is in the form of

(a) Production rules

(b) Rule interpreters

(c) Control rules

(d) Meta rules

4- Which AI system provides a diagnosis to a specific problem?

(a) Intelligent agent

(b) Expert system

(c) Geographical information system

(d) Data mining system

5- Which AI system will continue to analyze a problem until it finds the best solution?

(a) Genetic algorithm

(b) Neural network

(c) Intelligent agent

(d) Expert system

6- Which of the following is the heart of expert systems?

(a) Explanation Processor

(b) Knowledge Base

(c) Inference Engine

(d) Working Memory

7- Which of the following search algorithm combines the advantages of both depth‐first

and breadth‐first search into a single method?

(a) Hill climbing

(b) A* algorithm

(c) Greedy search

(d) Best-First Search

Page 15: Q1: Choose the correct answeruotechnology.edu.iq/dep-cs/mypdf/highstudy/1415/q/g.pdf · Q1: Choose the correct answer: 1) ... Data diddling 3-The _____ of ... Which of the following

15

Q16: Draw Semantic Net for the following text:

Tom is a cat. Tom caught a bird. Tom is owned by John. The cat sat on the mat. A cat is a

mammal. A bird is an animal. All mammals are animals.