Computer Engineering Quiz 6 Related Post Computer Engineering Quiz 20 Computer Engineering Quiz 19 Computer Engineering Quiz 18 Computer Engineering Quiz 17 Computer Engineering Quiz 16 1. A ______ application use more than one customization methods. Microcontroller Digital Analogue Complex 2. A ___________ is a software generated interrupt caused either by an error or by a user request for an operating system service. Signal SIGINT Trap Lost Interrupt 3. A ___________ is an unordered collection of distinct objects. Graph Set Tree Functions 4. A ______________ is a diagram that illustrates Relationship between data. Data Dictionary DBA DBMS Data model 5. A _______________ bit is added to the hardware of the computer to indicate the current mode (monitor mode or user mode). parity even odd mode 6. A ________________ is a sequence of steps to solve a specific problem. Program Instruction Data Object Code 7. A __________________ within a small part of a program could result in a catastrophe in larger part. Code Design Fault Documentation 8. A ____________________ is a collection of processors that do not share memory, peripheral devices or a clock. Command-line interpreter Distributed system Protection system File management 9. A ____________________ is conceptually a table, but the records of this table are not stored in the database. Table Information Metadata View 10. A _____________________ can translate the words into their bit patterns very easily. Assembler Processor Transistor Microprocessor 11. A _______________is a variable that any method in a class can access, including static methods such as main. Global variable Static variable Class variable Dynamic variable 12. A _____________is a set of independent computers linked by a computer network that appear to the users of the system as a single computer. Distributed system Standalone system File System Client / Server system 13. A ____________instruction has a dedicated CPU register, called the accumulator, to hold one operand and to store the result. 1-address 2-address 3-address 4-address 14. A character data type takes ____________ bits in memory. 8 16 32 64 15. A binary tree with N internal nodes has ________ links. 2N 1N 3N 4 N 16. A bonding of atoms strengthened by the sharing of electrons is called ________. ionic bonding crystal bonding covalent bonding lattice 17. A catastrophe in larger part may be the result of _________ within a small part of a program. Code Design Fault Documentation 18. A certain number of threads can perform single ____ in multithreading Task Application Command Interrupt 19. A complex application use more than _____________ customization methods. Four Three Two One 20. A computer professional should ______________ study and practice of new technologies. Promote Demote Know Market Loading … Question 1 of 20