Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

First (7)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Palestine Polytechnic University

College of Information technology and Computer Engineering


Computer Programming Principles 5055
First Exam
Student Name:_________________________ ____________________________)‫االسم (عربي‬
Date: 9/10/2018 Student Number:_____________________
Times: 60 Minutes Section:____________________________

‫ضع اشاره بجانب اسم المدرس‬


‫مازن زلوم‬ ‫عليان أبو غربيه‬ ‫عالء الحلواني‬ ‫ازدهار جوابره‬
‫يوسف صالح‬ ‫ضياء ابو زينة‬ ‫موسى ارفاعية‬ ‫منال التميمي‬
‫رحاب السالمين‬ ‫وسام شمروخ‬

Question # 1(10) 2(15) 3(15) Total Grade (40)


Grade

Question1
A. (5 points): Choose the suitable device for each sentence

Hub, repeater, switch, router, micro filter, terminator, repeater, fan, power supply, modem.

1) ( ) Regenerates incoming signals to preserve signal integrity and extend


the distance over which data can safely travel.
2) ( ) Enables a computer to transmit data over telephone line by
Converting analog signal to digital signal and vice versa.
3) ( ) Connects your house network to the internet service provider (ISP)
network.
4) ( ) installed on a telephone line to allow both ADSL and regular voice.
5) ( ) An intelligent hub.

B. List the three network topologies you have studied


1) 2) 3)
List two types of volatile memory
1) 2)
Question2 (15 points): Read these sentences carefully, then answer with true or false
1. CU is used to temporarily store program instructions and instruction
results.
2. High density laser beam is used to read from an optical disk.

3. Android is an open source operating system software.

4. The speed of the upstream is 8 times the speed of the downstream.

5. Disk defragmentation increases data access efficiency (speed).

6. The web uses a peer to peer network architecture.

7. HTTP is an internet protocol.

8. All computers with CD drive can read DVD.

9. Twisted pair cables is more expensive than fiber optics.

10. In the ring topology, if the shared line failed the whole network will fail.

11. The higher the resolution of an image the bigger the file size of the
stored image.
12. The HDD disk surface is divided into sectors and tracks.

13. 192.186.100.0 is a valid IP address

14. Computers found in cars are classified as supercomputers.

15. More CPU cores means better performance.


Question3(15 points): Choose the most suitable answer and fill it in the table below:
‫يرجى تعبئة اإلجابات في الجدول التالي‬
Question no. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Answer

1. Increasing the main memory size (capacity) will


a. Increase the system performance b. Decrease the system performance

c. Has no effect on performance d. Nothing of the above.

2. Which of the following memory types uses magnetic field to store data
a. CD b. SSD

c. HDD d. Blu-ray

3. PPI is a metric typically used to describe the


a. Aspect ratio b. Sharpness

c. Resolution d. Nothing of the above

4. One of the following memories stores data permanently


a. Cache b. Main memory

c. ROM d. Registers

5. One of the following is an impact printer


a. Daisy wheel b. Plotter

c. thermal printer d. inkjet


6. 2 Mbytes equal
a. 2x220TByte b. 2/220TByte

c. 230TByte d. 1/230TByte

7. The operating system is responsible for


a. Memory management b. Peripheral management
c. User interface d. All of the above

8. The measure that is related to the amount of data that can be transmitted
over a network in a given amount of time is

a. Speed b. Bandwidth
c. Size d. Cost

9. Which of the following memory types is the fastest


a. Cache b. SSD
c. HDD d. Registers

10. Microsoft office is a


a. Device driver b. Utility software
c. Desktop application d. Firmware

11. Which of the following is an output device


a. Bar code scanner b. Joystick
c. speaker d. microphone

12. The cloud storage does not achieve


a. Privacy b. Accessibility

c. big storage d. All the above


13. Denial of service attack
a. Done by overwhelming a server by b. Done by creating a fake site to
requests from thousands of deceive users.
computers at the same time.
c. Done by social engineering d. Happened when we use
behavior. Bluetooth.

14. Which of the following is a network security system


a. Worm b. firewall

c. Wi-Fi d. Malware

15. Which of the following transmission media has the highest transmission rate
a. Twisted pair b. Coaxial cable

c. Fiber optics d. All have the same transmission


rate.

End of the exam

You might also like