Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

20. Assuming that each of the following bit patterns originally had even parity,

ID: 671013 • Letter: 2

Question

20. Assuming that each of the following bit patterns originally had even parity, which one contains an error?

                A. 100110100                     B. 110000011                     C. 010011000            D. 100011001

21. How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8?

                A. 3        B. 4        C. 5        D. 6

22. Which of the following is a possible LZW compression of the message “xyz xyz xyz”?

                A. 1234                 B. 1234545          C. 232                   D. 12

23. Which of the following systems is least efficient when encoding numeric values?

                A. Two’s complement notation                       B. Excess notation

                C. ASCII                                                              D. Floating-point notation

24. Which of the following is a means of encoding music?

                A. ASCII              B. MIDI                C. JPEG D. GIF

25. Which of the following provides a compressed representation of an image by limiting the number of different pixel colors to 256, thereby enabling each pixel in an image to be represented by a single byte whose value indicates which of a palette of entries represents the pixel’s color?

                A. ASCII              B. MPEG              C. JPEG D. GIF

26. Which of the following components of an operating system maintains the directory system?

                A. Device drivers                  B. File manager                    C. Memory manager

27. Which of the following components of an operating system handles the details associated with particular peripheral equipment?

                A. Device drivers                  B. File manager                    C. Memory manager

28. Which of the following components of an operating system is not part of the kernel?

                A. User Interface                 B. File manager                    C. Scheduler

29. Multitasking in a computer with only one CPU is accomplished by a technique called

                A. Bootstrapping                 B. Batch processing            C. Multiprogramming

30. Execution of an operating system is initiated by a program called the

                A. Window manager           B. Scheduler                         C. Boot loader

31. The end of a time slice is indicted by the occurrence of a signal called

                A. An interrupt                     B. A semaphore                   C. A login

32. A section of a program that should be executed by at most one process at a time is called a

                A. Utility                                B. Critical region                  C. Privileged instruction

33. Which of the following is not an attempt to provide security?

                A. Passwords                        B. Privilege levels C. Multitasking

34. Which of the following items of information would not be contained in an operating system’s process table?

                A. The location of the memory area assigned to the process

                B. The priority of each process

                C. Whether the process is ready or waiting

                D. The machine language instructions being executed by the process

               

35. Which of the following events is detrimental to an operating system’s performance?

                A. Deadlock          B. Interrupt                           C. Booting

36. Which of the following is a technique for controlling access to a critical region?

                A. Spooling           B. Time sharing                    C. Semaphore                      D. Booting

37. Which of the following is not involved in a context switch?

                A. Interrupt           B. Process table                    C. Dispatcher                        D. User Interface

38. Which of the following concepts is not associated with critical regions?

                A. Semaphores     B. Mutual exclusion            C. Bootstrap

39. Which of the following is not a role of a typical operating system?

                A. Control the allocation of the machine’s resources

                B. Control access to the machine

                C. Maintain records regarding files stored in mass storage

                D. Assist the computer user in the task of processing digital photographs

40. Which of the following is a task that is not performed by the kernel of an operating system?

                A. Communicate with the user         B. Schedule processes

                C. Allocate resources                          D. Avoid deadlock

41. Which of the following is not a means of performing multiple activities at the same time?

                A. Pipeling             B. Multiprogramming         C. Virtual memory              D. Multiple processors

42. Which of the following components of an operating system is executed as the result of an interrupt signal?

                A. Dispatcher        B. Memory manager          C. File manager

43. Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system?

                A. Maintain records regarding the location of files

                B. Maintain records regarding the ownership of files

                C. Maintain records regarding the size of files

                D. None of the above

44. Which of the following would not require real-time processing?

                A. Typing a document with a word processor

                B. Navigation of an aircraft

                C. Forecasting world-wide trend for the next five year period

                D. Maintaining a airline reservation system

45. Which of the following statements is true?

                A. Allowing several processes to share time in a multiprogramming system is less efficient than

     executing each of them to completion one after the other.

B. The use of passwords provides an impenetrable safeguard.

C. Both A and B

D. Neither A not B

46. Which of the following is not a way of classifying networks?

                A. WAN versus LAN                           B. Closed versus open

                C. Router versus bridge                      D. Star versus bus

47. Ethernet is a means of implementing which of the following network topologies?

                A. Star                    B. WiFi                   C. Bus   

48. Which of the following connects existing networks to form an internet?

                A. Bridge               B. Router               C. Switch               D. Repeater

49. Which of the following is a protocol for controlling the right to transmit a message in a network?

                A. UDP                   B. CSMA/CD       C. TCP                   D. FTP

50. Which of the following is not a means of performing interprocess communication over a network?

                A. Client/server                    B. ICANN             C. Peer-to-peer

51. Which of the following is assigned the task of providing individual users access to the Internet?

                A. Tier-1 ISPs       B. Tier-2 ISPs       C. Access ISPs      D. ICANN

52. Which of the following is not an application of the Internet?

                A. FTP                    B. Email                C. Telnet                D. CERT

53. The primary purpose of which of the following is not the enhancement of security?

                A. ICANN             B. Firewall             C. Encryption       D. CERT

54. Which of the following is used to translate between IP addresses and mnemonic addresses?

                A. File server         B. Mail server       C. Name server    D. FTP server

55. Which of the following is not a means of connecting networks?

                A. Switch               B. Server                C. Router               D. Bridge

56. Which layer of the TCP/IP hierarchy actually transmits a message?

                A. Application      B. Transport         C. Network            D. Link

57. Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?

                A. Application      B. Transport         C. Network            D. Link

58. Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?

A. Application      B. Transport         C. Network            D. Link

Explanation / Answer

QUESTION No Correct Option   

20. C

21 A

22 B

23 D

24. B

25. D

26. B

27 . A

28. A

29. C

30. C

31 B

32 B

33 C

34 D

35 A

36 C

37 B

38. C

39 D

40 A

41 C

42 A

43 B

44 A

45 C

46 D

47 B

48 B

49 D

50 B

51 C

52 A

53 D

54 C

55 B

56 B

57 C

58 B