0% found this document useful (0 votes)
583 views5 pages

Aces Review Center: Ree Online Review Refresher Esas 7B by Engr. Jimmy L. Ocampo 0920 - 644 - 6246

This document appears to be a review test containing 39 multiple choice questions related to computer science and engineering topics. The questions cover subjects like binary conversion, computer hardware, programming languages, operating systems, and more. The test is attributed to Engr. Jimmy L. Ocampo and provides his contact information.

Uploaded by

Jr Trinidad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
583 views5 pages

Aces Review Center: Ree Online Review Refresher Esas 7B by Engr. Jimmy L. Ocampo 0920 - 644 - 6246

This document appears to be a review test containing 39 multiple choice questions related to computer science and engineering topics. The questions cover subjects like binary conversion, computer hardware, programming languages, operating systems, and more. The test is attributed to Engr. Jimmy L. Ocampo and provides his contact information.

Uploaded by

Jr Trinidad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ACES REVIEW CENTER

REE ONLINE REVIEW


REFRESHER ESAS 7B
BY ENGR. JIMMY L. OCAMPO
0920 . 644 . 6246

1. Convert the binary number 10101 to decimal number.


a. 25 b. 18 c. 10 d. 29

2. Divide (1111) base 2 by (100) base 2 Express the answer in base 10.
a. 11.101 b. 11.010 c. 11.110 d. 11.011

3. What is the UPS stand for?


a. Uninterrupting Power Supply b. Uninterruptible Power Supply
c. United Power Supply d. Uninterruptible Portable Supply

4. The Central Processing Unit of computer is a combination of


a. arithmetic logic and input unit b. control and storage
c. arithmetic logic and control unit d. control and input unit

5. A technician has installed a new video card and the computer will now only boot into VGA mode. Which of
the following may be the cause of the problem?
a. there is an operating system incompatibility b. the external monitor is not compatible
c. the new card is not DVI compatible d. the incorrect drivers are installed

6. When installing the heatsink back into a computer after replacing a failed processor, which of the following
must be done during installation?
a. thermal compound must be installed between the processor and the heatsink
b. thermal compound must be installed between the processor and the system board
c. an isopropyl alcohol pad must be placed between the processor and the heatsink
d. an isopropyl alcohol pad must be placed between the processor and the system board

7. Which of the following computer program is NOT considered open-source software?


a. firefox b. Microsoft office c. linux d. OpenOffice.com

8. Which of the following do you called the brain of any computer system?
a. arithmetic logic unit b. central processing unit
c. random access memory d. control processing system

9. A printed circuit board that has (at least) slots to connect cards into. Often, they also include a CPU and
memory is called
a. mainframe b. IDE port c. motherboard d. server

10. Which of the following is the basic symbol uses as a beginning at termination in logic diagram or flowchart?
a. square box b. oval symbol c. rectangular box d. diamond box

11. What form of software can also be called firmware?


a. cache memory b. operating system c. system BIOS d. random memory

12. In printing your document in the computer, what is the default mode?
a. page view b. landscape c. page set-up d. portrait

13. What is the standardized communication technique for expressing instructions to a computer?
a. flow chart b. programming language c. algorithm d. logic

14. HTTPi// is an identifier that appears at the beginning of most Web page. What does HTTP stands for?
a. Hypertime Text Process b. Hypertext Transfer Protocol
b. Hypertext Transmission Process d. Hypertext Time Protocol
15. Which of the following portion of hard disk space served as RAM?
a. cache b. random memory c. read-only memory d. virtual memory

16. W, x, and Y are Boolean variables. W and X are inputs to an AND gate and its output combines with Y in
another AND gate resulting in Z. What values of W, X and Y will result in Z = 1?
a. 1, 0, 1 b. 1, 1, 1 c. 1, 1, 0 d. 0, 1, 1

17. What decimal number is equivalent to binary number 1101?


a. 14 b. 12 c. 11 d. 13

18. Which of the following are used in designing and documenting complex processes or programs that help to
visualize what is going on and thereby help the viewer to understand a process or algorithm?
a. charts b. flowcharts c. diagrams d. networks

19. A megabyte is exactly ___ bytes


a. 1,084,567 b. 999,999 c. 1,048,576 d. 1,000,000

20. Which of the following is a correct IF statement?


a. IF (I,GE,5) b. IF (I.GE.5) c. IF (I,GE,5) GO TO 7 d. IF (I.GE.5) GO TO 7

21. Encryption can provide all of the following features of information systems security EXCEPT
a. confidentiality b. integrity c. authenticity d. privacy

22. Why is the following expression NOT acceptable as a FORTRAN integer constant?
237,100
a. the first character must be a letter b. there are more than six characters
c. there is no decimal point d. it contains a comma

23. Wat is a correct declaration form for the logical variable AZ?
a. AZ = .TRUE. b. AZ = 1 c. AZ = 1. d. AZ = ‘TRUE’

24. Which of the following is NOT acceptable as a FORTRAN statement?


a. A = B b. A = B + C c. AB = C*D d. A*B = C*D

25. Which of the following is the mathematical equivalent of the given FORTRAN expression?
SIN(2.0PI)**ABS(Y-1.0)
a. (sin 2π)^y-1 b. (sin 2π)^|y-1| c. sin 2π**|y-1| d. sin (2π)^|y-1|

26. Which of the following is the corresponding FORTRAN FORMAT statement for this output?
( ̺ denotes a blank space)
̺ ̺ ̺ ̺SUM = ̺ 2230.
a. 10 FORMAT (5X,‘SUM =’,F5.1) b. 10 FORMAT (5X,‘SUM =’,1X,F5.0)
c. 10 FORMAT (5X,‘SUM =’,F6.1) d. 10 FORMAT (5X,‘SUM =’,1X,F5)

27. Numerical characters arranged as 22.2 ̺̺̺̺̺̺̺̺̺ 55184.5 ̺̺̺̺̺̺̺̺̺ 750 are available to be read. ( ̺̺̺̺̺̺̺̺̺̺̺̺ denotes a blank space.)
What numbers will the computer read using the following FORMAT statement?
READ (5,8) X1, X2, X3, X4
FORMAT (4F4.2)
a. 22.2, 5.51, 8.45, 7.50 b. 2.22, 5.51, 84.5, 7.50
c. 22.2, 55.10, 84.5, 7.50 d. 22.2, 5.51, 84.5, 7.50

28. Which is the correct DIMENSION statement for a 9x9 matrix, A, and a vector, B, with nine elements?
a. DIMENSION A(9.9),B(9) b. DIM A(9,9),B(9)
c. DIMENSION A(9,9),B(9) d. DIMENSION, A(9,9),B(9)
29. Given the following statements, what is the value of R in the MAIN program?
EXTERNAL EXP main program
A=0.0
R=FUNCT(A,EXP)+20.0

FUNCTION FUNCT(X,FX) function definition


FUNCT=FX(X)
RETURN
END
a. 0.0 b. 1.0 c. 20.0 d. 21.0

30. If A and B are false and C is true, which of the following logical expressions will be true?
a. .NOT.C.AND.A b. B.AND.C.OR.A c. .NOT.(A.AND.B) d. .NOT.C

31. What are the values assigned to A and B in this subroutine?


COMMON APLHA,BETA main program
ALPHA = 4.0
BETA = 3.0
COMMON B,A subroutine
a. A = 3.0, B = 3.0 b. A = 4.0, B = 3.0 c. A = 3.0, B = 4.0 d. A = 4.0, B = 4.0

32. Of the following statements, which is FALSE?


a. the FORMAT statement may or may not be executed by the program
b. more than one STOP statement is permitted in a program
c. the arithmetic IF can only be used to evaluate an arithmetic expression
d. no FORMAT statement is required with unformatted READ or WRITE statements

33. What value is assigned to Q in this program?


R = 18.0
S = 6.0
T = 2.0
Q = R/S**T-T
IF Q 10,20,30
10 Q = 10
15 GO TO 40
20 Q = 100
25 GO TO 40
30 Q = 1000
40 END
a. -1.5 b. 10 c. 100 d. 1000
34. Which of the following DO statements counts J from 1 to 11 in increments of 2?
a. DO 5 J = 1,2,11 b. DO 5, J = 1,11,2
c. DO 5 J = 1.11.2 d. DO 5 J = 1,11,2

35. A data line is as follows: 21.459214.5307421557.82134524. Which of the following is an incorrect storage
of this data using the following READ statement?
READ (5,98)A,B,I,J,C,K
98 FORMAT (2F7.4,2I2,F6.2,I3)
a. A = 21.4592 b. B = 14.5307 c. J = 15 d. K = 134

36. Which of the following is the correct WRITE statement to print the even numbers from 2 to 40, assuming
conventional output device reference numbers?
a. WRITE(6,8) (I = 1,40,2)
8 FORMAT(20I2)
b. WRITE(5,8) (I = 2,40,2)
8 FORMAT(20I2)
c. WRITE(5,8) (I = 2,40,2)
8 FORMAT(20I2)
d. WRITE(6,8) (I = 2,40,2)
6 FORMAT(20I2)
37. Which of these expression for a one-dimensional array, A, is acceptable? Assume B,H,I,J,K and L are
greater than zero.
a. A(I,K) b. A(H+J) c. A(2*L-1) d. A(-3)

38. A collision avoidance automotive radar is designed to detect the presence of vehicles up to a range of 0.5
km, what is the maximum usable PRF?
a. 300,000 Hz b. 200,000 Hz c. 100,000 Hz d. 250,000 Hz

39. Which of the following statement is FALSE?


a. interrupts are used to develop RTOS b. RTOS performs tasks in predictable amount of times
c. Kernel is the one component of any OS d. Window 98 is RTOS

40. The number of address lines requires to address a memory of size 32 K is ___ lines
a. 18 b. 16 c. 13 d. 15

41. All of the following are basic components of a security policy except
a. definition of the issue and statement of relevant terms
b. statement of roles and responsibilities
c. statements of acceptability and compliance requirements
d. statement of performance of characteristics and requirements

42. A security policy would include all the following except


a. background b. scope statement c. audit d. enforcement

43. Which of the following is an important characteristics of an information security policy


a. identifies major functional areas of information
b. quantifies the effect of the loss of the information
c. requires the identification of information owners
d. lists applications that support the business function

44. Ensuring the integrity of business information is the primary concern of


a. encryption security b. procedural security
c. logical security d. on-line security

45. Which of the following would be the first step in establishing an information security program?
a. adoption of a corporate information security policy statement
b. development and implementation of an information security standards manual
c. development of a security awareness training program
d. purchase of security access control software

46. Which of the following should not be contained within a computer policy?
a. definition of management expectations
b. responsibilities of individuals and groups for protected information
c. statement of the senior executive support
d. definition of legal and regulatory controls

47. Network security is


a. product b. protocols
c. ever evolving process d. quick-fix solution

48. Security is a process that is


a. continuous b. indicative c. examined d. abnormal

49. What are the 3 fundamental principles of security


a. accountability, confidentiality, integrity
b. confidentiality, integrity, and availability
c. integrity, availability and accountability
d. availability, accountability and confidentiality
50. What refers to the computer’s use of hard disc storage to simulate RAM?
a. volatile memory b. ROM c. data storage d. virtual memory

51. What is a step by step drawing representing a specific procedure to algorithm?


a. flowchart b. block diagram
c. assembler diagram d. machine code

52. What kind of language can computer understand?


a. normal language b. computer language
c. assembly language d. high-level language

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy