What is the most basic element of every computer system?
3. Open Ended
30 seconds
1 pt
Every Boolean function can be constructed from only:
4. Open Ended
30 seconds
1 pt
AND
5. Open Ended
30 seconds
1 pt
NOT
6. Open Ended
30 seconds
1 pt
NAND
7. Open Ended
30 seconds
1 pt
OR
8. Open Ended
30 seconds
1 pt
The boolean expression A · B represents which of the following:
9. Open Ended
30 seconds
1 pt
True/False: According to DeMorgan's Theorem, inverting the output of an AND gate yields the same output as an OR gate with inverted inputs?
10. Open Ended
30 seconds
1 pt
What is the decimal equivalent of the binary number 10011101? Assume "unsigned" binary for the conversion.
11. Open Ended
30 seconds
1 pt
What is the decimal value of 54 (base 10) converted to binary and 2's complement?
12. Open Ended
30 seconds
1 pt
Which of the following is NOT a component required to represent a floating point number in binary?
a. Exponent
b. Fraction
c. Sign bit
d. Precision
13. Open Ended
30 seconds
1 pt
A coding approach that recognizes the MSB with a value of 1 to be a negative number is called?
14. Open Ended
30 seconds
1 pt
An unsigned binary number can represent positive and negative numbers but not floating point numbers.
15. Open Ended
30 seconds
1 pt
Adding 011011012 to 101000102 in 8-bit unsigned binary will cause an overflow.
16. Open Ended
30 seconds
1 pt
The 2's complement bit string 10101011 converted to decimal equals 85
17. Open Ended
30 seconds
1 pt
The operation to be performed within the ALU is selected with a multiplexor circuit.
18. Open Ended
30 seconds
1 pt
In a 16-bit Multiplexor the selector is 16-bit wide.
19. Open Ended
30 seconds
1 pt
What is the binary pattern that represents 6ten (in a 16-bit binary system)?
20. Open Ended
30 seconds
1 pt
Which Two-Input Boolean function will return 0 for every input it receives?
21. Open Ended
30 seconds
1 pt
The Full Adder chip has:
22. Open Ended
30 seconds
1 pt
A decoder has a unique output represented for a set of inputs in a truth table?
23. Open Ended
30 seconds
1 pt
According to DeMorgan's Theorem, inverting the output of an AND gate yields the same output as an OR gate with inverted inputs?
24. Open Ended
30 seconds
1 pt
Which of the following is NOT a component required to represent a floating point number in binary?
25. Open Ended
30 seconds
1 pt
What is the decimal value of this 16-bit 2's complement number?
1111111111111100two
26. Open Ended
30 seconds
1 pt
In an 8-way multiplexor the selection is specified by a set of ___ control bits.
27. Open Ended
30 seconds
1 pt
The ny control bit will:
28. Open Ended
30 seconds
1 pt
The 2's complement bit string 10101011 converted to decimal equals 85.
29. Open Ended
30 seconds
1 pt
A decoder described as a 2-to-4 decoder will have how many active outputs?
30. Open Ended
30 seconds
1 pt
If a=b=1 then out=1 else out=0
31. Open Ended
30 seconds
1 pt
If in=0 then out=1 else out=0
32. Open Ended
30 seconds
1 pt
If a=b=1 then out=0 else out=1
33. Open Ended
30 seconds
1 pt
If a=b=0 then out=0 else out=1
34. Open Ended
30 seconds
1 pt
If a demultiplexor selector bit is set to 1 , and both outputs (a and b) are 0 , then the input must have been:
35. Fill in the Blank
30 seconds
1 pt
16-bit / 64-register memory 16 is the _____ of the register
36. Fill in the Blank
30 seconds
1 pt
16-bit / 64-register memory 64 is the _____ of the register
37. Open Ended
30 seconds
1 pt
DFF behavior can be represented as:
38. Open Ended
30 seconds
1 pt
A RAM device accepts the minimum following inputs:
39. Open Ended
30 seconds
1 pt
When implementing the a 1-bit register, we need to tell the register when to store a new data and when to keep storing its internal value. For that we need a :
40. Open Ended
30 seconds
1 pt
In the DFF symbolic notation, the small triangle represents the :
41. Open Ended
30 seconds
1 pt
A counter is combinational logic, that simply adds a constant (typically 1) to a given number.
42. Open Ended
30 seconds
1 pt
The clock in a sequential logic circuit keeps track of hours, minutes, and seconds in the local timezone.
43. Open Ended
30 seconds
1 pt
The von Neumann architecture is based on a:
44. Open Ended
30 seconds
1 pt
Different types of Registers:
45. Open Ended
30 seconds
1 pt
Which of the following is NOT a component of the CPU?
46. Open Ended
30 seconds
1 pt
Which part of the CPU is in charge of decoding the instructions before they can be executed, and deciding which instruction to fetch and execute next?
47. Open Ended
30 seconds
1 pt
The basic idea of the stored program concept is that the logic of the programs is embedded in the hardware.
48. Open Ended
30 seconds
1 pt
A_COMMAND
49. Open Ended
30 seconds
1 pt
C_COMMAND
50. Open Ended
30 seconds
1 pt
L_COMMAND
51. Open Ended
30 seconds
1 pt
Predefined symbols
52. Open Ended
30 seconds
1 pt
labels
53. Open Ended
30 seconds
1 pt
Variables
54. Open Ended
30 seconds
1 pt
during the first pass
55. Open Ended
30 seconds
1 pt
during the second pass
56. Open Ended
30 seconds
1 pt
In the Hack machine language, the ability to use a command like @label before the label was actually declared in the program is thanks to the
57. Open Ended
30 seconds
1 pt
During the second pass of the assembly process, if a symbol is not found in the symbol table, then it clearly represents a new ...
58. Open Ended
30 seconds
1 pt
During the first pass of the assembly process you should use a counter.This counter should be incremented by 1 whenever a C-command, an A-command or an L-command is encountered.
59. Open Ended
30 seconds
1 pt
The data structure used for representing the correspondence between symbols and their meaning is:
60. Open Ended
30 seconds
1 pt
As part of the translation process the symbols must be resolved into actual ...
61. Open Ended
30 seconds
1 pt
Any symbol Xxx appearing in an assembly program that is not predefined and is not defined elsewhere using the (Xxx) command is treated as a ...
62. Open Ended
30 seconds
1 pt
In Hack Assembly the meaning of the symbols are their RAM and ROM addresses.
63. Open Ended
30 seconds
1 pt
During the first pass of the assembly process you should use a counter.This counter should be incremented by 1 whenever a C-command, an A-command or an L-command is encountered
64. Open Ended
30 seconds
1 pt
Supply the hexadecimal result of 6 + 7 (both base 10) if stored in a 16 bit register
65. Open Ended
30 seconds
1 pt
People who use the chip as an internal part in other chip definitions should not be interested in the body of the chip definition
66. Open Ended
30 seconds
1 pt
The degree of a relationship is described as the relationship's maximum cardinality.
67. Open Ended
30 seconds
1 pt
"A student can attend six courses, each with a different instructor. Each instructor has 30 students."
What is the type of relationship between students and instructors?
68. Open Ended
30 seconds
1 pt
In an Entity-Relationship model, which concept is generally used to represent a student?
69. Open Ended
30 seconds
1 pt
The address of a student can be defined using street, city, state, and zip code. What type of attribute should be used to represent the address of a student?
70. Open Ended
30 seconds
1 pt
For the relationship represented in the figure below, which of the following is true?
71. Open Ended
30 seconds
1 pt
A student's name, birthday, and student number are all examples of:
72. Open Ended
30 seconds
1 pt
Given only the following part of an E-R diagram, what does the circle across the relationship line near the entity in the figure below indicate?
73. Open Ended
30 seconds
1 pt
Given only the following part of an E-R diagram, what does the hash mark across the relationship line near the entity in the figure below indicate?
74. Open Ended
30 seconds
1 pt
How can a multivalued attribute be represented in an E-R model?
75. Open Ended
30 seconds
1 pt
The E-R model is used to build a conceptual model.
76. Open Ended
30 seconds
1 pt
Question text
All instances of a given entity set have the same attributes in the E-R Model.
77. Open Ended
30 seconds
1 pt
Which of the following is not a component of a database model?
78. Open Ended
30 seconds
1 pt
Which of the following is not a goal of normalization?
79. Open Ended
30 seconds
1 pt
Given a relation R with five attributes A,B,C,D,E with the following dependencies:
80. Open Ended
30 seconds
1 pt
A deletion anomaly occurs when deleting data about one entity results in the loss of data about another entity.
81. Open Ended
30 seconds
1 pt
Consider a relation, R (A, B, C, D, E) with the given functional dependencies; A → B, B → DE and D → C. What is the closure (A)?
82. Open Ended
30 seconds
1 pt
Which of the following would motivate to de-normalize a relation?
83. Open Ended
30 seconds
1 pt
Consider the following table that shows the Movie relation. In the relation, {Movie_Title, Year} form a candidate key. Which of the following is correct about this Movie relation?
84. Open Ended
30 seconds
1 pt
Relations should always be normalized to the highest normal form possible.
85. Open Ended
30 seconds
1 pt
Given a relation R with three attributes A, B, C with the following dependencies:
ABC → C
C → A
What is the candidate key for R?
86. Open Ended
30 seconds
1 pt
A relation is in the first normal form if it has no more than one multivalued attribute.
87. Open Ended
30 seconds
1 pt
A relation is in BCNF if, and only if, every determinant is a candidate key.
88. Open Ended
30 seconds
1 pt
Which of the following is wrong?
Select one:
a. A relation includes a foreign key matching the primary key of other relation is called an insertion anomaly
b. If the removal of data in one entity results in the unintentional loss of data in another entity is deletion anomaly
c. A relation is in 2NF if and only if it is in 1NF and all non-key attributes are determined by the entire primary key
d. The condition that a non-key attribute determines another non-key attribute is known as transitive dependency
89. Open Ended
30 seconds
1 pt
Consider a relation that doesn't include multivalued attributes and non-key attributes in this relation dependent on the primary key. However, this relation contains transitive dependencies. What is the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF)?
90. Open Ended
30 seconds
1 pt
Consider a relation, R (A, B, C, D, E) with the given functional dependencies; A → B, B → DE and D → C. What is the closure (C)?
91. Open Ended
30 seconds
1 pt
If B is a subset of attributes in set A, then which of the following is wrong?
92. Open Ended
30 seconds
1 pt
Which of the following sentences is incorrect?
93. Open Ended
30 seconds
1 pt
Which one is not an anomaly type which results from redundancy?