Tải bản đầy đủ (.pdf) (15 trang)

Tổng hợp đề thi tiếng anh tin học sinh viên

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (653.47 KB, 15 trang )

BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút
Test number: 01

1. The technology of integrated circuits came into picture in the
a) IInd Generation
b) IIIrd generation
c) IVth generation
d) None of the above
2. The flag used to carry out the processor operation one step at a time is the
a) Interrupt flag
b) Auxiliary Flag
c) Direction Flag
d) Trap Flag
3. A memory management scheme in which the total address space of a process is divided into blocks that may be
placed in non-contiguous area of memory is termed as
a) Compaction
b) Paging
c) Segmentation
d) None of the above
4. A topology in which each machine is connected to each other is
a) Tree topology
b) Star topology
c) Bus topology
d) Mesh topology
5. A hardware register used to store the result of the previous arithmetic or logical operation performed by the ALU
is referred to as
a) Hardware register


b) Accumulator
c) General Purpose register
d) None of the above
6. A topology where a number of other machines are connected to a centralized machine is
a) Mesh topology
b) Star topology
c) Tree topology
d) None of the above
7. The technology used in the 3rdgeneration computers is that of:
a) Very Large Scale Integration
b) Integrated Circuits
c) Vacuum Tubs
d) None of these
8. A technique used for data transfer between the memory and I/O devices is referred to as
a) Spooling
b) Direct Memory Access
c) Interrupt
d) None of these
9. In MSDOS, which command is used to remove a directory from the multilevel directory structure?
a) rmdir
b) mkdir
c) rd
d) a and c both
10. In MSDOS, which command is used to delete a directory along with all its files and subdirectory?
a) rmdir
b) rd /s /q
c) rd /s
d) delete
11. Which kind of wireless transition can penetrate buildings?
a) Radio waves

b) Microwaves
c) Infrared waves
d) Light wave
12. Which layer deals with the error free transmission of data in OSI Reference model?
a) Data link layer
b) Network layer
c) Transport layer
d) Internet layer
13. The difference between a floppy disk and a hard disk is in terms of their __________.
a) storage capacity
b) structure
c) access speed
d) all the above
14. __________ is used to point to a memory portion.
a) Segment Register
b) Instruction Pointer
c) Address Register
d) None of the above
15. The fastest and the most expensive systems in the world are ___________.
a) Microcomputer
b) Minicomputer
c) Mainframe
d) Supercomputers
16. All the disks in a computer system are assigned ___________.
a) an alphabet
b) a word
c) a character
d) a letter
17. The ___________ is a register that is used by the ALU to temporarily hold the results of a previous operation.
a) Data Register

b) Address Register
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này


BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút

18.

19.

20.

21.

22.

23.

24.

25.

c) Accumulator
d) Pointer and Index Register
The mouse is connected to the __________ interface.
a) Serial

b) parallel
c) Both a and b
d) None of the above
__________ can process thousands of interrupts per second.
a) Time sharing system
b) Combination system
c) Real Time System
d) Distributed System
In ________ physical memory is divided into fixed size shots called page frames.
a) Segmentation
b) Paging
c) Compaction
d) None of the above
From a processors point of view ,the instructions that is to be executed currently is pointed to by a register called
_______
a) Accumulator
b) Program counter
c) Base register
d) None of the above
______ operating systems support simultaneous access to a computer system from two or more active terminals
a) Multi-user
b) Multiprocessor
c) Multi-access
d) None of the above
A set of parallel electrical conducting lines that connect various components on the motherboard is referred to as
_________
a) Topology
b) Protocol
c) Data transfer
d) bus

The screen contains some small pictures below which some name are present. These pictures are called________
a) icons
b) folders
c) documents
d) None of the above
The characters ? and * are referred to as ______________.
a) file handling characters
b) directory commands
c) wildcard characters
d ) None of these

26. The performance of RAM is generally measured in terms of access time. (T/F)
27. Cache is smaller and faster than RAM. (T/F)
28. In a modular motherboard, the board has slots for connections. (T/F)
29. Primary storage has the fastest access time. (T/F)
30. Floppy disks are magnetic coated disks used for data storage. (T/F)
31. Data must be transferred to the processor before they can operate upon. (T/F)
32. The processor is a hardware unit that acts as an assistant to the coprocessor for arithmetic operations. (T/F)
33. Cathode Ray Tube (CRT) is a device used to generate images. (T/F)
34. Plotters are used to generate graphical output and for precision drawings. (T/F)
35. A real time system does not require a very fast response. (T/F)
36. Process is the smallest unit of work individually schedulable by the operating system. (T/F)
37. Swapping is a method by which the operating system switches suspended or pre-empted processes between the
main memory and secondary memory. (T/F)
38. Processes are scheduled to be executed by the scheduler. (T/F)
39. The broadband coaxial cable is not used for digital communication (T/F)

40. Based on their size, a computer network is said to be a LAN, MAN or WAN. (T/F)
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này



BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút
Test number: 02
1. The technology of integrated circuits came into picture in the
a) IInd Generation
b) IIIrd generation
c) IVth generation
d) None of the above
2. The binary equivalent of (156)8 is
b) (1101101101)2
a) (1101110)2
c) (101010011)2
d) None of the above
3. The flag used to carry out the processor operation one step at a time is the
a) Interrupt flag
b) Auxiliary Flag
c) Direction Flag
d) Trap Flag
4. The loader that loads the operating system into the memory of the computer is knows as
a) Bootstrap Loader
b) Relocatable Loader
c) Absolute Loader
d) None of the above
5. A memory management scheme in which the total address space of a process is divided into blocks that may be
placed in non-contiguous area of memory is termed as
a) Compaction

b) Paging
c) Segmentation
d) None of the above
6. A table that contains an entry for each page in the system is the
a) Page description table
b) Page allocation table
c) Page map table
d) None of the above
7. A topology in which each machine is connected to each other is
a) Tree topology
b) Star topology
c) Bus topology
d) Mesh topology
8. The OSI layer concerned with the syntax and semantics of the information transmission is the
a) Application layer
b) Session layer
c) Presentation layer
d) Transport layer
9. A hardware register used to store the result of the previous arithmetic or logical operation performed by the ALU
is referred to as
a) Hardware register
b) Accumulator
c) General Purpose register
d) None of the above
10. When a number is right shifted once the number is
a) Divided by 2
b) Multiplied by 2
c) Added by 2
d) None of the above
11. A topology where a number of other machines are connected to a centralized machine is

a) Mesh topology
b) Star topology
c) Tree topology
d) None of the above
12. The TCP/IP reference model consists of
a) 7 layers
b) 4 layers
c) 5 layers
d) None of the above
13. From a processors point of view ,the instructions that is to be executed currently is pointed to by a register called
_______
a) Accumulator
b) Program counter
c) Base register
d) None of the above
14. ______ operating systems support simultaneous access to a computer system from two or more active terminals
a) Multi-user
b) Multiprocessor
c) Multi-access
d) None of the above
15. ___________ flag is used for string manipulation operation
a) Direction flag
b) Interrupt flag
c) Auxiliary flag
d) Trap flag
16. A set of parallel electrical conducting lines that connect various components on the motherboard is referred to as
_________
a) Topology
b) Protocol
c) Data transfer

d) bus
17.
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này


BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút
18. The screen contains some small pictures below which some name are present. These pictures are called________
a) icons
b) folders
c) documents
d) None of the above
19. The characters ? and * are referred to as ______________.
a) file handling characters
b) directory commands
c) wildcard characters
d ) None of these
20. The fastest and the most expensive systems in the world are ___________.
a) Microcomputer
b) Minicomputer
c) Mainframe
d) Supercomputers
21. The operating system is an example of ___________.
a) Hardware
b) Application Software
c) System Software
d) Software tool

22. All the disks in a computer system are assigned ___________.
a) an alphabet
b) a word
c) a character
d) a letter
23. The difference between a floppy disk and a hard disk is in terms of their __________.
a) storage capacity
b) structure
c) access speed
d) all the above
24. __________ is used to point to a memory portion.
a) Segment Register
b) Instruction Pointer
c) Address Register
d) None of the above
25. The mouse is connected to the __________ interface.
a) Serial
b) parallel
c) Both a and b
d) None of the above
26. __________ can process thousands of interrupts per second.
a) Time sharing system
b) Combination system
c) Real Time System
d) Distributed System
27. The computer can be defined as a data manipulating digital electronic device. (T/F)
28. Maskable interrupts are ignored by the 8088 processor if the interrupt flag is set.(T/F)
29. Multiuser operating system provides facilities for maintenance of individual user environment and requires user
authentication for security and protection. (T/F)
30. The TCP/IP reference model owes its evolution to ARPNANET. (T/F)

31. The data link layer receives data from the session layer ,break it up into smaller units and if required passes them
to the network layer. (T/F)
32. Token management and synchronization are the services provided by the session layer. (T/F)
33. Metropolitan area networks (MAN) spans a large network area. (T/F)
34. The DMA unit cannot be a part of a peripheral control unit for a device. (T/F)
35. In the visual display unit, the property of the phosphors to glow for a specified time after being hit by the electron
beam is called persistence. (T/F)
36. The hard disk is not a set of magnetic disks packed together. (T/F)
37. All the deleted items are dumped into the recycle bin. (T/F)
38. ROM is used to temporarily store data and this data would be wiped out as soon as the electricity is switched off.
(T/F)
39. The joystick is a pointing device. (T/F)
40. In binary numbers, most significant bit is the rightmost bit. (T/F)
41. Based on their size, a computer network is said to be a LAN, MAN or WAN. (T/F)
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này


BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút
Test number: 03

1. Which generation computers introduced the technology of integrated circuits (IC)?
a) First-generation computers
b) Second-generation computers
c) Third-generation computers
d) Fourth-generation computers
2. In MSDOS, which command is used to remove a directory from the multilevel directory structure?

a) rmdir
b) mkdir
c) rd
d) a and c both
3. In MSDOS, which command is used to delete a directory along with all its files and subdirectory?
a) rmdir
b) rd
c) deltree
d) delete
4. Which kind of wireless transition can penetrate buildings?
a) Radio waves
c) Infrared waves

b) Microwaves
d) Light wave

5. Which layer deals with the error free transmission of data in OSI Reference model?
a) Data link layer
b) Network layer
c) Transport layer
d) Internet layer
6. The binary equivalent of (156)8 is
a) (1101110)2
c) (101010011)2

b) (1101101101)2
d) None of the above

7. The loader that loads the operating system into the memory of the computer is knows as
a) Bootstrap Loader

b) Relocatable Loader
c) Absolute Loader
d) None of the above
8. A table that contains an entry for each page in the system is the
a) Page description table
c) Page map table

b) Page allocation table
d) None of the above

9. The OSI layer concerned with the syntax and semantics of the information transmission is the
a) Application layer
b) Session layer
c) Presentation layer
d) Transport layer
10. When a number is right shifted once the number is
a) Divided by 2
c) Added by 2

b) Multiplied by 2
d) None of the above

11. The TCP/IP reference model consists of
a) 7 layers
c) 5 layers

b) 4 layers
d) None of the above

12. The technology used in the 3rdgeneration computers is that of:

a) Very Large Scale Integration
c) Vacuum Tubs

b) Integrated Circuits
d) None of these

13. A set of parallel electrical conducting lines that connect various components on the motherboard is referred to as
_________
a) Topology
b) Protocol
c) Data transfer
d) bus
14. The screen contains some small pictures below which some name are present. These pictures are called________
a) icons
b) folders
c) documents
d) None of the above
15. The characters ? and * are referred to as ______________.
a) file handling characters
c) wildcard characters

b) directory commands
d ) None of these

16. The fastest and the most expensive systems in the world are ___________.
a) Microcomputer
b) Minicomputer
c) Mainframe
d) Supercomputers
17. The operating system is an example of ___________.

a) Hardware
b) Application Software
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này


BÀI THI
TRẮC NGHIỆM TIẾNG ANH – TIN HỌC
Olympic Tin học Sinh viên Việt Nam lần thứ 14,
Đại học Khoa học tự nhiên, Đại học Quốc gia Tp Hồ Chí Minh
từ 23/4/2005 đến 25/4/2005, Thời gian: 30 phút
c) System Software

d) Software tool

18. All the disks in a computer system are assigned ___________.
a) an alphabet
b) a word
c) a character
d) a letter
19. The difference between a floppy disk and a hard disk is in terms of their __________.
a) storage capacity
b) structure
c) access speed
d) all the above
20. __________ is used to point to a memory portion.
a) Segment Register
b) Instruction Pointer
c) Address Register
d) None of the above
21. The mouse is connected to the __________ interface.

a) Serial
b) parallel
c) Both a and b
d) None of the above
22. From a processors point of view ,the instructions that is to be executed currently is pointed to by a register called
_______
a) Accumulator
b) Program counter
c) Base register
d) None of the above
23. ______ operating systems support simultaneous access to a computer system from two or more active terminals
a) Multi-user
b) Multiprocessor
c) Multi-access
d) None of the above
24. __________ can process thousands of interrupts per second.
a) Time sharing system
b) Combination system
c) Real Time System
d) Distributed System
25. In ________ physical memory is divided into fixed size shots called page frames.
a) Segmentation
b) Paging
c) Compaction
d) None of the above
26. Floppy disks are magnetic coated disks used for data storage. (T/F)
27. Data must be transferred to the processor before they can operate upon. (T/F)
28. The processor is a hardware unit that acts as an assistant to the coprocessor for arithmetic operations. (T/F)
29. Cathode Ray Tube (CRT) is a device used to generate images. (T/F)
30. Swapping is a method by which the operating system switches suspended or pre-empted processes between the

main memory and secondary memory. (T/F)
31. The broadband coaxial cable is not used for digital communication (T/F)
32. Based on their size, a computer network is said to be a LAN, MAN or WAN. (T/F)
33. The computer can be defined as a data manipulating digital electronic device. (T/F)
34. Multiuser operating system provides facilities for maintenance of individual user environment and requires user
authentication for security and protection. (T/F)
35. The TCP/IP reference model owes its evolution to ARPNANET. (T/F)
36. The data link layer receives data from the session layer ,break it up into smaller units and if required passes them
to the network layer. (T/F)
37. The hard disk is not a set of magnetic disks packed together. (T/F)
38. Cache is smaller and faster than RAM. (T/F)
39. In a modular motherboard, the board has slots for connections. (T/F)
40. Primary storage has the fastest access time. (T/F)
Trung tâm Tin học – Trường Đại học Khoa học Tự nhi ên TpHCM hân hạnh được tài trợ cuộc thi này


The Vietnam Student Olympiad in IT – CANTHO UNIVIERSITY 2011
English Test
Duration: 30 mins
Test no. 001
True/False
Indicate whether the statement is true or false.
____

1. HTML tags enable the browser to display Web page content in a graphical, easy-to-read format.

____

2. SQL sends only the data you want to view.


____

3. The memory cells of an array may store different types of data.

____

4. The maximum number of levels is called the height of a tree.

____

5. The following code fragment is an example of an endless loop:
int iCount = 1;
while (iCount <= 5)
{
System.out.println(“I am on number “ + iCount);
}

____

6. Spiral prototyping starts with an initial pass using the waterfall model.

____

7. The project manager is assigned the role of creating and maintaining the database structure.

____

8. One rule of software engineering is that you should be realistic when defining project completion dates.

____


9. The cost of manufacturing storage devices with no moving parts is considerably more than a conventional
hard drive.

____ 10. The original Eniac computer occupied approximately 50 square feet of space.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 11. The process of changing image format from one type to another is called ____.
a. Cropping
c. Conversion
b. Rotating
d. Blurring
____ 12. Which of the following tools has the primary focus of enhancing a Web site?
a. Microsoft PowerPoint
c. Macromedia Flash MX
b. Microsoft Project
d. Borland Delphi
____ 13. ____ are characters that are used to match any character at the end of a file name to a particular file extension.
a. Deuces
c. Aces
b. Jokers
d. Wildcards
____ 14. Your Internet provider maintains a switching center called a _____.
a. Nexus
c. cusp
b. point-of-presence
d. receive-and-send
____ 15. The _____ protocol establishes a link from an e-mail client to a mail server.
a. SMTP
c. IMAP

b. POP3
d. HTTP

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


____ 16. The port number can be analogized to which of the following address components?
a. street address
c. zip code
b. City
d. apartment number
____ 17. HTML and the Web connect one page to another through _____.
a. Overlinks
c. hyperlinks
b. Higherjoins
d. cyberbridges
____ 18. _____ formats content for display in a browser and transfers information via the Web.
a. SGML
c. HTML
b. XML
d. PHP
____ 19. Which of the following is a valid SQL clause for sorting returned rows of data?
a. SORT BY
c. ARRANGE BY
b. ORDER BY
d. CLASS BY
____ 20. Which of the following can be classified as a data structure?
a. Integer

c. character
b. Array
d. float
____ 21. In Java, which punctuation mark tells the computer that the end of the statement has been reached?
a. Period
c. semicolon
b. Colon
d. comma
____ 22. A two dimensional array declared with size [3] [3] may contain how many elements?
a. Three
c. nine
b. Six
d. sixteen
____ 23. Which of the following data structures adapts least efficiently to dynamic memory allocation.
a. linked lists
c. stacks
b. Queues
d. arrays
____ 24. The computer logically organizes source code into _____ or groups of related computer commands that
perform a task.
a. Procedures
c. methods
b. Functions
d. routines
____ 25. In order to sort data you first need to create a(n) _____ that defines the process for sorting.
a. List
c. stack
b. Queue
d. algorithm
____ 26. A(n) ____ is a program included with an executable application that acts as the translator between the

program and the computer by converting program statements one by one into a language the computer
understands.
a. IDE
c. constructor
b. Interpreter
d. endless loop
____ 27. A(n) ____ is a program that reads all statements from a program and converts them into a computer language.
a. Event
c. compiler
b. Object
d. control structure
____ 28. A(n) ____ resides between the lowest-level language and a higher-level language; it assigns letter codes to
each machine language instruction.
a. machine language
c. class
b. Constructor
d. assembly language
____ 29. A(n) ____ is a statement that associates an identifier with a variable.
a. Attribute
c. variable
b. endless loop
d. declaration

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


____ 30. A(n) ____ is a self-contained entity that consists of both data and procedures.
a. Constructor

c. object
b. Method
d. parameter
____ 31. ____ is the process of creating an object based upon a class.
a. Inheritance
c. Instantiation
b. Concatenation
d. Variable initialization
____ 32. A(n) ____ is a special class function/method used for creating or instantiating an object.
a. event handler
c. expression
b. Constructor
d. function
____ 33. With ____ tools are available that allow end users to work with prototypes of the screens and other interfaces.
a. incremental development
c. build and fix
b. rapid prototyping
d. waterfall
____ 34. ____ is a software modeling process that enables system developers to create a blueprint showing the overall
functionality of the program being engineered and provides a way for the client and the developer to
communicate.
a. SDLC
c. UML
b. Scope creep
d. Prototyping
____ 35. The ____ is the leader of the team and is responsible for choosing the right players for the right positions.
a. database administrator
c. client
b. project manager
d. programmer

____ 36. The ____ is created by reviewing the screens and reports the end user would like included in the application
and determining which fields are essential to the application.
a. use case
c. class diagram
b. data dictionary
d. sequence diagram
____ 37. A(n) ____ is an amateur hacker that simply uses the hacking tools that have been developed by others.
a. Cracker
c. script kiddie
b. reverse engineer
d. Trojan horse
____ 38. A(n) ____ occurs when a program tries to place more information into a memory location than it can handle.
a. access attack
c. virus attack
b. buffer overflow
d. modification attack
____ 39. A(n) ____ is a program that poses as an innocent program; some action or the passage of time triggers it to do
its dirty work.
a. Trojan horse
c. worm
b. Firewall
d. virus
____ 40. In order for a computer to emulate human behavior and reasoning, it needs to have the ability to ____.
a. Walk
c. learn
b. Talk
d. hear

Sponsored by FPT UNIVERSITY


www.fpt.edu.vn


The Vietnam Student Olympiad in IT – CANTHO UNIVERSITY 2011
English Test
Duration: 30 mins
Test no. 002
True/False
Indicate whether the statement is true or false.
____

1. FTP transmission methods are appropriate for placing files in a common location so that many users can
download and have access to them.

____

2. The third normal form creates columns that are independent of the primary key.

____

3. Data structures organize the data in a computer.

____

4. Java implements the selection control structure through the use of the if, if-else, if-else-if, and switch
statements.

____

5. One of the main rules of software engineering is that users should not be involved in designing reports.


____

6. An important reason for using a design document is that it can serve as a blueprint.

____

7. One rule of software engineering is that you should be realistic when defining project completion dates.

____

8. Malicious code comes in a few major forms: the Trojan horse, the virus, and the worm.

____

9. Asymmetric encryption uses a private key to both encrypt and decrypt data.

____ 10. Input and output devices increase the speed of the typical computer.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 11. A ____ tool is the most logical choice for the development of a slide show.
a. presentation
c. word processing
b. spreadsheet
d. scheduling
____ 12. A situation known as ____ occurs when all active processes are tied up in a circular wait for resources.
a. synchronization
c. safe mode
b. context switch
d. deadlock

____ 13. Operating systems allow you to organize files into structures called folders or ____.
a. directories
c. stacks
b. arrays
d. vectors
____ 14. ____ are characters that are used to match any character at the end of a file name to a particular file extension.
a. Deuces
c. Aces
b. Jokers
d. Wildcards
____ 15. _____ has been the Internet standard protocol for remote login to a UNIX host.
a. FTP
c. IMAP
b. HTTP
d. Telnet
____ 16. HTML and the Web connect one page to another through _____.
a. overlinks
c. hyperlinks
b. higherjoins
d. cyberbridges

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


____ 17. Data that has been organized and logically related to allow access, retrieval, and use of that data is called a
_____.
a. store
c. field

b. database
d. record
____ 18. To put the table into the _____ normal form, a separate row needs to be created for each row-column
intersection with more than one value.
a. first
c. third
b. second
d. fourth
____ 19. Which of the following is a valid SQL word used to return data in descending order?
a. BOTTOM
c. DESC
b. OPP
d. REV
____ 20. Which of the following operations removes an item from a stack?
a. pop
c. delete
b. remove
d. eject
____ 21. A _____ represents a hierarchical structure similar to that of organizational or genealogy charts.
a. grid
c. digraph
b. network
d. tree
____ 22. A binary search tree contains _____ components.
a. two
c. four
b. three
d. eight
____ 23. The _____ sort starts with the last element in the list and compares its value to that of the item just above it in
the list order.

a. bubble
c. heap
b. insertion
d. quick
____ 24. A(n) ____ is a program that reads all statements from a program and converts them into a computer language.
a. event
c. compiler
b. object
d. control structure
____ 25. A(n) ____ resides between the lowest-level language and a higher-level language; it assigns letter codes to
each machine language instruction.
a. machine language
c. class
b. constructor
d. assembly language
____ 26. The term ____ refers to the spelling and grammar used within a programming language.
a. interpreter
c. declaration
b. syntax
d. event
____ 27. Which of the following terms describes a readable description of an algorithm written in human language?
a. Encapsulation
c. Concatenation
b. Variable initialization
d. Pseudocode
____ 28. Assigning a value to a variable at declaration is called ____.
a. startup
c. concatenation
b. variable initialization
d. shortcut notation

____ 29. A(n) ____ is a self-contained entity that consists of both data and procedures.
a. constructor
c. object
b. method
d. parameter
____ 30. A(n) ____ is someone or something that needs the program to perform a function or meet a need, and who
determines the required functionality of the program.
a. project manager
c. end user
b. database administrator
d. tester

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


____ 31. In the ____ model of software development, the fundamental processes involved in creating the program are
represented as phases. The output from each phase is used as the input to the next phase.
a. build and fix
c. rapid prototyping
b. waterfall
d. spiral
____ 32. With ____ the application is developed and released in a series of software releases.
a. incremental development
c. build and fix prototyping
b. waterfall prototyping
d. rapid prototyping
____ 33. The UML ____ diagram shows how one class communicates with another by sending messages back and
forth.

a. class
c. collaboration
b. sequence
d. sequence
____ 34. The ____ is the interface between the testers, developers, and end users during the creation and early release
cycles of the product.
a. project manager
c. database administrator
b. programmer
d. customer relations representative
____ 35. A(n) ____ is a software program that allows the user to listen in on network traffic.
a. Trojan horse
c. worm
b. sniffer
d. honey pot
____ 36. Transforming original data into coded data so that only authorized parties can interpret it is known as ____.
a. authentication
c. piracy
b. packet filtering
d. encryption
____ 37. A(n) ____ firewall inspects each packet and moves it along an established link to its destination.
a. proxy
c. packet-filtering
b. biometric
d. digital
____ 38. ____ is the study of matter and radiation at the atomic level.
a. Fuzzy logic
c. Robotics
b. Pattern recognition
d. Quantum mechanics

____ 39. The science of ____ is primarily concerned with the mechanics and electronics that are used to carry out the
results of the other areas of artificial intelligence.
a. fuzzy logic
c. pattern recognition
b. robotics
d. natural language processing
____ 40. In order for a computer to emulate human behavior and reasoning, it needs to have the ability to ____.
a. walk
c. learn
b. talk
d. hear

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


The Vietnam Student Olympiad in IT – CANTHO UNIVERSITY 2011
English Test
Duration: 30 mins
Test no. 003
True/False
Indicate whether the statement is true or false.
____

1. Researching the benefits and features of the various software tools involves a one-time investment of time and
energy.

____


2. Files may be viewed as leaves or nodes on a tree-like structure.

____

3. HTML tags enable the browser to display Web page content in a graphical, easy-to-read format.

____

4. Indexes do not require additional storage space in the database.

____

5. One-to-one relationships are never appropriate.

____

6. The order of the fields does not have to match that of the defined table structure.

____

7. The statement “anArray [2] = 5;” assigns the number five (5) to the third component of anArray.

____

8. A queue is another type of linked list that implements a LIFO storage system.

____

9. The selection sort is highly efficient for large lists.


____ 10. An important reason for using a design document is that it can serve as a blueprint.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 11. UML or Universal ____ Language diagrams are used to develop object-oriented systems and programs.
a. Modeling
c. Middling
b. Markup
d. Master
____ 12. File ____ Protocol (or FTP) is a transmission method used to send files across the Internet.
a. Task
c. Test
b. Transfer
d. Table
____ 13. The ____ is the core of the OS.
a. file manager
c. GUI
b. scheduler
d. kernel
____ 14. A program that is currently executing is called a ____.
a. code segment
c. JCL
b. process
d. regular routine
____ 15. Partitioning, ____, and folder creation are all done to prepare a disk to receive files.
a. scanning
c. rebooting
b. formatting
d. signaling
____ 16. Subnets are defined through the use of a subnet _____.
a. filter

c. sentinel
b. screen
d. mask

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn


____ 17. The problem of having to remember IP addresses was solved by allowing Web servers to have _____ names.
a. range
c. resource
b. locator
d. domain
____ 18. The port number can be analogized to which of the following address components?
a. street address
c. zip code
b. city
d. apartment number
____ 19. Crawling makes use of a special program called a bot or _____.
a. bug
c. spider
b. butterfly
d. centipede
____ 20. A(n) _____ is a special type of file that occupies its own space and specifies one or more columns that
determine how the information stored in a table is organized.
a. field
c. tab
b. identifier
d. index

____ 21. The set of rules that dictates how databases are designed is called _____.
a. normalization
c. customization
b. standardization
d. invocation
____ 22. A _____ key is simply a column or combination of columns that uniquely identifies a row within a table.
a. main
c. chief
b. primary
d. principal
____ 23. Looking at the top item to inspect it without removing it from the stack is called _____.
a. peeking
c. scanning
b. snooping
d. viewing
____ 24. Backtracking is most efficiently accomplished by using a(n) _____.
a. stack
c. tree
b. queue
d. array
____ 25. Which of the following operations removes an item from a stack?
a. pop
c. delete
b. remove
d. eject
____ 26. The _____ sort starts with the last element in the list and compares its value to that of the item just above it in
the list order.
a. bubble
c. heap
b. insertion

d. quick
____ 27. Which of the following routines implements two list structures to perform sorting operations?
a. merge sort
c. bubble
b. selection sort
d. quicksort
____ 28. A(n) ____ is a program that reads all statements from a program and converts them into a computer language.
a. event
c. compiler
b. object
d. control structure
____ 29. A(n) ____ is a programming language that resembles more what a computer can understand rather than a
human
a. low-level language
c. event handler
b. high-level language
d. postcondition loop
____ 30. ____ determine the functions of the software and any constraints or requirements.
a. Data dictionaries
c. Use cases
b. Software specifications
d. UMLs
____ 31. Testing software to ensure that it meets the software specifications is called ____.
a. scope creep
c. rapid prototype
b. software validation
d. incremental development

Sponsored by FPT UNIVERSITY


www.fpt.edu.vn


____ 32. The ____ is the interface between the testers, developers, and end users during the creation and early release
cycles of the product.
a. project manager
c. database administrator
b. programmer
d. customer relations representative
____ 33. The term ____ is used to describe a type of bot that can roam a network looking for vulnerable systems to
replicate itself onto those systems.
a. reverse engineer
c. Trojan horse
b. worm
d. proxy firewall
____ 34. A(n) ____ is a software program that allows the user to listen in on network traffic.
a. Trojan horse
c. worm
b. sniffer
d. honey pot
____ 35. ____ attacks seek to create a false impression that an event did not occur when it did, or did occur when it did
not.
a. DMZ
c. Repudiation
b. DoS
d. Modification
____ 36. ____ is the illegal copying of software .
a. Software piracy
c. Social engineering
b. Biometrics

d. Dumpster diving
____ 37. A(n) ____ is characterized by three things: targets that might be attacked, agents or attackers, and events.
a. risk
c. copyright
b. callback
d. threat
____ 38. A(n) ____ is a theoretical framework, or a way of doing things.
a. expert system
c. polymer
b. paradigm
d. MRAM
____ 39. ____ is an alliance of educators, students, researchers formed to create new computing paradigms and
products enabling people to interact with computers in a more natural and useful way.
a. Project RAM
c. Project Oxygen
b. Project Turing
d. AI
____ 40. ____ is a method of splitting a laser beam and using a device called a spatial light modulator to store full
pages of information in layers on a crystal material.
a. Fuzzy logic
c. Holographic storage
b. Pattern recognition
d. Speech recognition

Sponsored by FPT UNIVERSITY

www.fpt.edu.vn




×