Está en la página 1de 22

You need this to actually see the web

pages on the Internet.


A.E-mail
B.Spam
C.Web browser
D.None of the above

Which of the following is considered


personal information?
A.Your full name
B.Your address
C.Where you go to school
D.Your birthdate
E.All of the above

Explanation
Remember, the less you tell someone about yourself, the
safer you are. Predators can use even the smallest pieces of
information to find out who you are or establish a "friendship"
with you.

Google is an example of:


A.E-mail
B.Spam
C.A search engine
D.A bad web site

Spam is
A.Unsolicited e-mail
B.A virus
C.A picture
D.A browser

Which of the following is true for


coaxial cables?
A.It uses copper wires, which are good
conductors of electricity.
B.Coaxial cables provide effective protection
against EMI during data transmissions.
C.It uses light rays instead of electricity to
transmit data
D.It can be differentiated into two categories,
single-mode and multimode

In case of fiber-optic cables, which


transmission mode is used for
transmitting data over long distances?
A.Infrared
B.Radio
C.Single mode(Missed)
D.Multimode

What is the maximum bandwidth that


can be supported by fiber optics cable?
A.10 Mbps
B.50 Mbps
C.2000 Mbps(Missed)
D.100 Mbps

Media Access Control (MAC) and


Logical Link Control (LLC) are two
sublayers of _________________.
A.Session layer
B.Network layer
C.Transport layer
D.Data Link layer(Missed)

Radio waves and microwaves are used


in which of the following
communications?
A.Voice over IP
B.IP Telephony
C.Wireless
D.Enterprise

IP addresses exist in the numeric


format of XXX.YYY.ZZZ.AAA. This
format of specifying addresses is

referred to as the dotted decimal


notation. Each address consists of four
__________ separated by dots(.).
A.8-bit fields
B.4-bit fields
C.6-bit fields
D.2-bit fields

Which of the following statements is


NOT true regarding networks?
A.The first network called the ARPANET was
created by DOD with the help of Advanced
Research Projects Agency (ARPA).
B.Networks enable sharing of information
across the multiple networks.
C.Networks enable centralization of data
management.
D.Networks can be divided into four network
topologies: mesh, cellular, star and bus.

Which of the following describes a set


of rules that governs how a process it
to be completed?
A.DFD
B.Association matrix
C.Policy

D.Hierarchy chart

Which of the following is the definition


for a composite data flow?

A.The practice of making sure that a data flow


contains the correct for the receiving process
B.A data flow that consists of other data flows
C.A condition or event that triggers a process
D.Simplifies the interface between processes

Data flows can be described in terms of


all of the following types of data
structures EXCEPT:
A.A sequence or group of data attributes that
occur one after another
B.The selection of one or more attributes from
a set of attributes
C.The repetition of one or more attributes
D.The absence of one or more attributes(Missed)

All of the following are the types of


events that are associated with inputs
on the context diagram EXCEPT:
A.External events
B.Temporal events
C.National events(Missed)

D.State events

Which of the following is a language


syntax for specifying the logic of a
process?
A.Jargon
B.Policy
C.Structured English
D.Decision table

Which runs on computer hardware


and serve as platform for other
software to run on?
A.System Software
B.Application Software
C.All
D.Operating System

Which of the following Operating


System does not implement
multitasking truly?
A.Windows NT
B.MS DOS
C.Windows XP
D.Windows 98

Which is the layer of a computer


system between the hardware and
the user program
A.Operating environment
B.System environment
C.None
D.Operating system

The primary purpose of an


operating system is:
A.To allow people to use the computer
B.To keep systems programmers employed
C.To make computers easier to use
D.To make the most efficient use of the
computer hardware

The operating system creates _____


from the physical computer
A.None
B.Virtual device
C.Virtual space
D.Virtual computers

The operating system creates _____


from the physical computer
A.None

B.Virtual device
C.Virtual space
D.Virtual computers

Which of the following is NOT a


valid PHP comparison operator?
A.!=
B.>=
C.<=>
D.===

What is a correct way of defining


constants in PHP
A.Constant $var

B.Const $var
C.Constant ($var)
D.Define("Constant");

Which of the following functions


will be used to create a CURL
sessions
A.Curl_exec()
B.Curl_opt()
C.Curl_init()
D.Curl_setopt()

Which of following statements will


be used to fetch SINGLE record
from a MySql resultset
A.Mysql_connect
B.Mysql_query
C.Mysql_fetch_array
D.Mysql_fetch_row

What is HTML?
A.Hyper Type Makeup Longing
B.Hyper Text Markup Language
C.Hyper Type Marking Logo

Where is the text of the title tag


displayed?

A.In the body of the page


B.In the status bar
C.In the title bar

What happens if you forget a slash at


the end of a header tag?

A.Nothing
B.A Netscape error
C.Everything following will be a heading format

CSS stand for?


A.Case Sensitive Style
B.Computers Style Sheets
C.Cascade Style Sheets
D.Cascade Style Systems

A ___________ consist of a property


and a value,
A.Tag
B.Attribute
C.Deceleration

GetMonth() returns The Month as


A.Int(Missed)
B.Float
C.Char
D.String

Function is Used To Parse a String To Int


A.Integer.Parse
B.Int.Parse(Missed)
C.Parse.Int
D.None

Which Of The Dialog Box Display a


Message And a Data Entry Field
A.Alert()
B.Prompt()
C.Confirm()
D.Msg()

If Button is clicked .......Event Handler


is invoked
A.OnSubmit()
B.OnLoad()
C.IsPostBack()
D.Onclick()

A Function Associated With An object is


Called
A.Function
B.Method
C.Link
D.None

Which of the following is not a Java


keyword?
A.Default
B.For
C.Volatile
D.Of

Using the declaration below, what will


be the final element of the array? int [ ]
grades = new int[35];
A.Grades[0]
B.Grades[34]
C.Grades[35]
D.Impossible to tell

Which of the following is not a unary


operator?
A.Negation
B.Decrement
C.Bitwise complement
D.Assignment

Which symbol is used to denote a


multi-line comment?
A./ /
B./* */

C.{ }
D.< >

It defines the common variables and


methods of a set of objects.
A.Objects
B.Class
C.Function
D.Method

Which of the following is an invalid


variable declaration in Java?
A.Int NumberOfStudents = 250;
B.Double Salary =0.0;
C.String NAME =
D.Char CivilStatus =

It is the length of the data type short.


A.8 bits
B.16 bits
C.32 bits
D.64 bits

It is the rules of a programming


language.
A.Format
B.Logic

C.Object
D.Syntax

It is the code/s inside a pair of curly


braces.
A.Block
B.Brick
C.Function
D.Method

It is the length of the data type float.


A.8 bits
B.12 bits
C.16 bits
D.32 bits

It is the Java keyword that creates


inheritance.
A.Enlarge
B.Extends
C.Inherits
D.Inheritance

Which of the following is an invalid first


character of an identifier?
A.__
B.$

C.A
D.8(Missed)

If A=10, then after B=++A, the value


of B is _______.
A.10
B.11
C.12
D.13

If A=10, then after B=++A, the value


of B is _______.
A.10
B.11
C.12
D.13

Which of the following is not a primitive


data type?
A.Byte
B.String
C.Char
D.Long

What is the most basic language


Microsoft made?
A.Visual Basic
B.DirectX
C.Batch
D.C++

At Dartmouth College in 1964 John Kemeny


and Thomas Kurtz invented .... ?
ALGOL
BASIC
FORTRAN

BASIC
Complete this quote Computers are useless.
They can only give you ------- (Pablo
Picasso)

numbers
pictures
headaches
noise
answers

answers
Who invented C++ ?
Larry Wall
Anders Hejlsberg
Grace Hopper
John Backus

Bjarne Stroustrup
Alan Cooper

Bjarne Stroustrup
Which of these is not a functional
programming language
F#
Erlang
LISP
APL
Kite
Joy

Fortran
Miranda

Fortran
Dylan, Erlang, Haskell and ML are examples
of ... ?
web languages
declarative languages
functional languages
visual languages

functional languages
A true or false statement put into code that
the programmer expects to always be true is
an ...

exception
harness
assertion
expression

assertion
EBNF is ...
Extensible Book Notation Format
a replacement for the SAX XML parser
a syntax for defining grammar
the leader of the free software foundation

a syntax for defining grammar

A section of code that responds to a


particular interaction of the user with a gui
control is called a ... ?
dispatch function
event handler
control structure
exception handler

event handler

RISC is ...
a defensive programming style
a web framework

a threading library
a CPU design strategy

a CPU design strategy

También podría gustarte