20. Assuming that each of the following bit patterns originally had even parity,
ID: 671013 • Letter: 2
Question
20. Assuming that each of the following bit patterns originally had even parity, which one contains an error?
A. 100110100 B. 110000011 C. 010011000 D. 100011001
21. How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8?
A. 3 B. 4 C. 5 D. 6
22. Which of the following is a possible LZW compression of the message “xyz xyz xyz”?
A. 1234 B. 1234545 C. 232 D. 12
23. Which of the following systems is least efficient when encoding numeric values?
A. Two’s complement notation B. Excess notation
C. ASCII D. Floating-point notation
24. Which of the following is a means of encoding music?
A. ASCII B. MIDI C. JPEG D. GIF
25. Which of the following provides a compressed representation of an image by limiting the number of different pixel colors to 256, thereby enabling each pixel in an image to be represented by a single byte whose value indicates which of a palette of entries represents the pixel’s color?
A. ASCII B. MPEG C. JPEG D. GIF
26. Which of the following components of an operating system maintains the directory system?
A. Device drivers B. File manager C. Memory manager
27. Which of the following components of an operating system handles the details associated with particular peripheral equipment?
A. Device drivers B. File manager C. Memory manager
28. Which of the following components of an operating system is not part of the kernel?
A. User Interface B. File manager C. Scheduler
29. Multitasking in a computer with only one CPU is accomplished by a technique called
A. Bootstrapping B. Batch processing C. Multiprogramming
30. Execution of an operating system is initiated by a program called the
A. Window manager B. Scheduler C. Boot loader
31. The end of a time slice is indicted by the occurrence of a signal called
A. An interrupt B. A semaphore C. A login
32. A section of a program that should be executed by at most one process at a time is called a
A. Utility B. Critical region C. Privileged instruction
33. Which of the following is not an attempt to provide security?
A. Passwords B. Privilege levels C. Multitasking
34. Which of the following items of information would not be contained in an operating system’s process table?
A. The location of the memory area assigned to the process
B. The priority of each process
C. Whether the process is ready or waiting
D. The machine language instructions being executed by the process
35. Which of the following events is detrimental to an operating system’s performance?
A. Deadlock B. Interrupt C. Booting
36. Which of the following is a technique for controlling access to a critical region?
A. Spooling B. Time sharing C. Semaphore D. Booting
37. Which of the following is not involved in a context switch?
A. Interrupt B. Process table C. Dispatcher D. User Interface
38. Which of the following concepts is not associated with critical regions?
A. Semaphores B. Mutual exclusion C. Bootstrap
39. Which of the following is not a role of a typical operating system?
A. Control the allocation of the machine’s resources
B. Control access to the machine
C. Maintain records regarding files stored in mass storage
D. Assist the computer user in the task of processing digital photographs
40. Which of the following is a task that is not performed by the kernel of an operating system?
A. Communicate with the user B. Schedule processes
C. Allocate resources D. Avoid deadlock
41. Which of the following is not a means of performing multiple activities at the same time?
A. Pipeling B. Multiprogramming C. Virtual memory D. Multiple processors
42. Which of the following components of an operating system is executed as the result of an interrupt signal?
A. Dispatcher B. Memory manager C. File manager
43. Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system?
A. Maintain records regarding the location of files
B. Maintain records regarding the ownership of files
C. Maintain records regarding the size of files
D. None of the above
44. Which of the following would not require real-time processing?
A. Typing a document with a word processor
B. Navigation of an aircraft
C. Forecasting world-wide trend for the next five year period
D. Maintaining a airline reservation system
45. Which of the following statements is true?
A. Allowing several processes to share time in a multiprogramming system is less efficient than
executing each of them to completion one after the other.
B. The use of passwords provides an impenetrable safeguard.
C. Both A and B
D. Neither A not B
46. Which of the following is not a way of classifying networks?
A. WAN versus LAN B. Closed versus open
C. Router versus bridge D. Star versus bus
47. Ethernet is a means of implementing which of the following network topologies?
A. Star B. WiFi C. Bus
48. Which of the following connects existing networks to form an internet?
A. Bridge B. Router C. Switch D. Repeater
49. Which of the following is a protocol for controlling the right to transmit a message in a network?
A. UDP B. CSMA/CD C. TCP D. FTP
50. Which of the following is not a means of performing interprocess communication over a network?
A. Client/server B. ICANN C. Peer-to-peer
51. Which of the following is assigned the task of providing individual users access to the Internet?
A. Tier-1 ISPs B. Tier-2 ISPs C. Access ISPs D. ICANN
52. Which of the following is not an application of the Internet?
A. FTP B. Email C. Telnet D. CERT
53. The primary purpose of which of the following is not the enhancement of security?
A. ICANN B. Firewall C. Encryption D. CERT
54. Which of the following is used to translate between IP addresses and mnemonic addresses?
A. File server B. Mail server C. Name server D. FTP server
55. Which of the following is not a means of connecting networks?
A. Switch B. Server C. Router D. Bridge
56. Which layer of the TCP/IP hierarchy actually transmits a message?
A. Application B. Transport C. Network D. Link
57. Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?
A. Application B. Transport C. Network D. Link
58. Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?
A. Application B. Transport C. Network D. Link
Explanation / Answer
QUESTION No Correct Option
20. C
21 A
22 B
23 D
24. B
25. D
26. B
27 . A
28. A
29. C
30. C
31 B
32 B
33 C
34 D
35 A
36 C
37 B
38. C
39 D
40 A
41 C
42 A
43 B
44 A
45 C
46 D
47 B
48 B
49 D
50 B
51 C
52 A
53 D
54 C
55 B
56 B
57 C
58 B
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.