Aces Review Center: Ree Online Review Refresher Esas 7B by Engr. Jimmy L. Ocampo 0920 - 644 - 6246
Aces Review Center: Ree Online Review Refresher Esas 7B by Engr. Jimmy L. Ocampo 0920 - 644 - 6246
2. Divide (1111) base 2 by (100) base 2 Express the answer in base 10.
a. 11.101 b. 11.010 c. 11.110 d. 11.011
5. A technician has installed a new video card and the computer will now only boot into VGA mode. Which of
the following may be the cause of the problem?
a. there is an operating system incompatibility b. the external monitor is not compatible
c. the new card is not DVI compatible d. the incorrect drivers are installed
6. When installing the heatsink back into a computer after replacing a failed processor, which of the following
must be done during installation?
a. thermal compound must be installed between the processor and the heatsink
b. thermal compound must be installed between the processor and the system board
c. an isopropyl alcohol pad must be placed between the processor and the heatsink
d. an isopropyl alcohol pad must be placed between the processor and the system board
8. Which of the following do you called the brain of any computer system?
a. arithmetic logic unit b. central processing unit
c. random access memory d. control processing system
9. A printed circuit board that has (at least) slots to connect cards into. Often, they also include a CPU and
memory is called
a. mainframe b. IDE port c. motherboard d. server
10. Which of the following is the basic symbol uses as a beginning at termination in logic diagram or flowchart?
a. square box b. oval symbol c. rectangular box d. diamond box
12. In printing your document in the computer, what is the default mode?
a. page view b. landscape c. page set-up d. portrait
13. What is the standardized communication technique for expressing instructions to a computer?
a. flow chart b. programming language c. algorithm d. logic
14. HTTPi// is an identifier that appears at the beginning of most Web page. What does HTTP stands for?
a. Hypertime Text Process b. Hypertext Transfer Protocol
b. Hypertext Transmission Process d. Hypertext Time Protocol
15. Which of the following portion of hard disk space served as RAM?
a. cache b. random memory c. read-only memory d. virtual memory
16. W, x, and Y are Boolean variables. W and X are inputs to an AND gate and its output combines with Y in
another AND gate resulting in Z. What values of W, X and Y will result in Z = 1?
a. 1, 0, 1 b. 1, 1, 1 c. 1, 1, 0 d. 0, 1, 1
18. Which of the following are used in designing and documenting complex processes or programs that help to
visualize what is going on and thereby help the viewer to understand a process or algorithm?
a. charts b. flowcharts c. diagrams d. networks
21. Encryption can provide all of the following features of information systems security EXCEPT
a. confidentiality b. integrity c. authenticity d. privacy
22. Why is the following expression NOT acceptable as a FORTRAN integer constant?
237,100
a. the first character must be a letter b. there are more than six characters
c. there is no decimal point d. it contains a comma
23. Wat is a correct declaration form for the logical variable AZ?
a. AZ = .TRUE. b. AZ = 1 c. AZ = 1. d. AZ = ‘TRUE’
25. Which of the following is the mathematical equivalent of the given FORTRAN expression?
SIN(2.0PI)**ABS(Y-1.0)
a. (sin 2π)^y-1 b. (sin 2π)^|y-1| c. sin 2π**|y-1| d. sin (2π)^|y-1|
26. Which of the following is the corresponding FORTRAN FORMAT statement for this output?
( ̺ denotes a blank space)
̺ ̺ ̺ ̺SUM = ̺ 2230.
a. 10 FORMAT (5X,‘SUM =’,F5.1) b. 10 FORMAT (5X,‘SUM =’,1X,F5.0)
c. 10 FORMAT (5X,‘SUM =’,F6.1) d. 10 FORMAT (5X,‘SUM =’,1X,F5)
27. Numerical characters arranged as 22.2 ̺̺̺̺̺̺̺̺̺ 55184.5 ̺̺̺̺̺̺̺̺̺ 750 are available to be read. ( ̺̺̺̺̺̺̺̺̺̺̺̺ denotes a blank space.)
What numbers will the computer read using the following FORMAT statement?
READ (5,8) X1, X2, X3, X4
FORMAT (4F4.2)
a. 22.2, 5.51, 8.45, 7.50 b. 2.22, 5.51, 84.5, 7.50
c. 22.2, 55.10, 84.5, 7.50 d. 22.2, 5.51, 84.5, 7.50
28. Which is the correct DIMENSION statement for a 9x9 matrix, A, and a vector, B, with nine elements?
a. DIMENSION A(9.9),B(9) b. DIM A(9,9),B(9)
c. DIMENSION A(9,9),B(9) d. DIMENSION, A(9,9),B(9)
29. Given the following statements, what is the value of R in the MAIN program?
EXTERNAL EXP main program
A=0.0
R=FUNCT(A,EXP)+20.0
30. If A and B are false and C is true, which of the following logical expressions will be true?
a. .NOT.C.AND.A b. B.AND.C.OR.A c. .NOT.(A.AND.B) d. .NOT.C
35. A data line is as follows: 21.459214.5307421557.82134524. Which of the following is an incorrect storage
of this data using the following READ statement?
READ (5,98)A,B,I,J,C,K
98 FORMAT (2F7.4,2I2,F6.2,I3)
a. A = 21.4592 b. B = 14.5307 c. J = 15 d. K = 134
36. Which of the following is the correct WRITE statement to print the even numbers from 2 to 40, assuming
conventional output device reference numbers?
a. WRITE(6,8) (I = 1,40,2)
8 FORMAT(20I2)
b. WRITE(5,8) (I = 2,40,2)
8 FORMAT(20I2)
c. WRITE(5,8) (I = 2,40,2)
8 FORMAT(20I2)
d. WRITE(6,8) (I = 2,40,2)
6 FORMAT(20I2)
37. Which of these expression for a one-dimensional array, A, is acceptable? Assume B,H,I,J,K and L are
greater than zero.
a. A(I,K) b. A(H+J) c. A(2*L-1) d. A(-3)
38. A collision avoidance automotive radar is designed to detect the presence of vehicles up to a range of 0.5
km, what is the maximum usable PRF?
a. 300,000 Hz b. 200,000 Hz c. 100,000 Hz d. 250,000 Hz
40. The number of address lines requires to address a memory of size 32 K is ___ lines
a. 18 b. 16 c. 13 d. 15
41. All of the following are basic components of a security policy except
a. definition of the issue and statement of relevant terms
b. statement of roles and responsibilities
c. statements of acceptability and compliance requirements
d. statement of performance of characteristics and requirements
45. Which of the following would be the first step in establishing an information security program?
a. adoption of a corporate information security policy statement
b. development and implementation of an information security standards manual
c. development of a security awareness training program
d. purchase of security access control software
46. Which of the following should not be contained within a computer policy?
a. definition of management expectations
b. responsibilities of individuals and groups for protected information
c. statement of the senior executive support
d. definition of legal and regulatory controls