Академический Документы
Профессиональный Документы
Культура Документы
2. Death is almost certain when the current through the human body is
a. 10 mA
b. 100 mA
c. 50 mA
d. 75 mA
5. It is a recording of the electrical activity of the hearty during a physical stress to test the heart’s
reaction to increase the demand for oxygen the body needs.
a. heart test
b. stress test
c. oxygen level body demand test
d. health manipulation test
6. A CT scan is a biomedical equipment that can observe blood flow in any part of the brain. What
is the other term for CT scan?
a. municipal scan
b. CAT scan
c. Coaxial Table
d. ACT scan
7. In an array of light sources, which light wave has the most energy?
a. ultraviolet
b. infrared
c. visible
d. sound
10. In computer communications, it is a processing in which data are processed virtually as soon
as they are received.
a. on line processing
b. demand processing
c. real time processing
d. batch processing
13. The internet uses what method in assigning names and numbers to computers and users.
a. Domain name system
b. IP addressing
c. ZIP code method
d. Hypertext Mark-up filing system
14. Emitter Coupled Logic(ECL) has a very fast switching speed as compared to the rest of logic
families, what is then its typical switching time?
a. 5 sec
b. 5 millisec
c. 5 microsec
d. 5 nanosec
15. This is a low noise, biological isolation amplifier suitable to connection to measuring
electrodes attached anywhere on the human body.
a. bio amplifier
b. body amplifier
c. physio amplifier
d. psycho amplifier
16. ECG was developed by Wilhem Einthoven purposely to record heart’s electrical activity. What
ECG type is capable of displaying the cross section of the valves and chambers of the heart?
a. M-mode
b. 2D-echo
c. 3D-echo
d. Cupid telescope
17. A breakthrough in medical field when Wilhelm Roentgen developed X-ray in 1895. X-ray is a
diagnostic equipment using short wavelength of light that penetrate the body. Assuming your
grandmother has scoliosis, what possible X-ray type that a radiologist will use?
a. myelogram
b. arthrogram
c. scoliogram
d. lolagram
18.For a TTL gate, the recommended and standard fan out is _____.
a. 5
b. 10
c. 15
d. 20
19. Pacemaker is a battery operated device that helps the heart beat in a normal rhythm. This
function was based from the natural pacemaker of our biological body which is the ?
a. left ventricle
b. aorta
c. sinoatrial node
d. sino-ventricular node
20. MOS family used extensively where lowest power consumption is necessary is
a. PMOS
b. NMOS
c. CMOS
d. GMOS
21. Multiplexer is a circuit that accepts multiple inputs with only a single output. What is the other
name for multiplexer?
a. multiplier
b. Universal logic module
c. Universal logic package
d. not a demultiplexer
24. In a system with MOS devices, the main bus loading factor is likely to be:
a. resistive
b. current
c. capacitive
d. inductive
25. When a logic circuit rejects an unwanted signal, this is termed as______.
a. logic levels
b. noise margin
c. power consumption
d. propagation delay
28. How many NAND gates are needed to form an AND gate?
a. 1
b. 2
c. 3
d. 4
29. This is a list of all possible inputs and their expected outputs demonstrated to define logic
function.
a. function table
b.facts table
c. truth table
d. reality table
31. Microprogram is
a. the set of instructions indicating the primitive operation in a system
b. the name of the source program in microcomputers
c. the name of programs in very small size
d. the general name for MACROS in assembly language programming
34. These are the services used by the network to identify authorized users and computers
a. authentication services
b. directory services
c. log –on services
d. proxy services
35. A service used to deny unauthorized access to websites, files, programs and computers in a
networked environment.
a. firewall
b. access rights
c. access list
d. permissions
36.A flipflop whose output is the same as its input. This is sometimes used as a delay element.
a. RS flipflop
b. D flipflop
c. T flipflop
d. JK flipflop
39. A variation of PROM wherein its stored data can be erased by electrical signals instead of
ultraviolet light.
a. EEPROM
b. dynamic RAM
c. RAM
d. EPROM
40. “ the illumination is directly proportional to the cosine of the angle made by the normal to the
illuminated surface with the direction of the incident flux” This statement is associated with
a. Plancks Trigo Law
b. Lamberts Cosine Law
c. Macbeth’s law of associated lighting
d. Kagibuyo’s flux emission
41. What is this communication medium wherein programs are written in mnemonics?
a. high level language
b. low level language
c. assembly language
d. machine language
42. Among the following computer languages, what are high level languages?
1. FORTRAN
2. COBOL
3. BASIC
4. Pascal
a. 1 and 2 only
b. 1 , 2 and 3 only
c. 1, 2 and 4 only
d. 1, 2, 3 and 4
43. The fetching, decoding and executing an instruction is broken down into several time
intervals. Each of theses intervals involving one or more clock periods is called a
a. instruction cycle
b. process cycle
c. machine cycle
d. flow cycle
46. An instruction that can move data from memory to the accumulator.
a. Fetch
b. Move
c, Store
d. Load
49. A device that enables users to transmit computer data and fax messages along telephone
lines.
a. converter
b. facsimile
c. demodulator
d. modem
50. This is the term usually used when the monitor display is the actual size, design and layout
when saved and printed.
a. GUI
b. UI
c. WYSIWYG
d. RedHat
52. What is the dominant operating system used by apple or macintosh computers?
a. Windows
b. Linux
c. Unix
d. Jaguar
53. In LIFO
a. only the top of the stack is never accessible
b. only the top of the stack is immediately accessible
c. only the first is accessible
d. the last is not accessible
55. A microcomputer has 64 K memory, what is the hexadecimal notation for the first memory
location?
a. 0FFF
b. 1111
c. 0000
d. F000
56. 1991 saw the 'Tequila' virus outbreak. It was the first virus that could change its signature
(binary pattern) with each new replication in an attempt to escape detection from antivirus
software. What's the term for this type of virus?
a. alcoholic
b. polymorphic
c. geneophic
d. transmutant
57. A program that has the ability to replicate itself to your system and send out hundred or
thousands of copies of itself without attachments leaving a devastating effect
a. computer virus
b. bacteria
c. worm
d. Trojan Horse
58. It is a program that attached itself to other programs or files spreading from one computer to
another leaving infections as it travels.
a. computer virus
b. bacteria
c. worm
d. Trojan Horse
59. _______are also known to create a backdoor on your computer that gives malicious users
access to your system, possibly allowing confidential or personal information to be compromised.
It appears to be a useful software but when activated the results vary.
a. Earthworm
b. Gallup virus
c. Trojan Horse
d. Blaster Worm
60. It is the interface that allows the user to direct the computer to perform operations or execute
programs
a. user interface
b. Operating system
c. file explorer
d. Monitor screen
61. Repeated addition is one way to do multiplication. Program multiplication is used in most
microprocessors because
a. this saves on memory
b. their ALUs can only add and subtract
c. a separate instructions is needed for the two
d. masking is needed
63. What do you call the filter between a corporate network and the internet that keeps the
corporate network secure from the intruders while giving corporate users unlimited access to the
internet
a.bandstop
b. bandpass
c. firewall
d. firestorm
64. This 2001 virus was the first to use social engineering to lure in the victim. It spread rapidly by
masquerading as a digital picture of a celebrity and was named after the file supposedly on offer.
What was this virus called?
a. Anna Kournikova
b. Jennifer Lopez
c. Madonna
d. Ara Mina
65. This widespread 2004 virus utilised a vulnerability in Windows and spread through an open
FTP port. It replicated by randomly targeting IP addresses. What's the common name for this
virus?
a. Rugrats
b. Sasser
c. Xoombie
d. Halimaw
66. Nowadays, the target audience for virus authors is enormous with tens of millions of home
and office PC's all networked together by the Internet. Fortunately we can protect ourselves
against the majority of these attacks by running up-to-date antivirus software. Which of these
major software publishers DOESN'T produce antivirus software?
a. Symantec
b. Trend Micro
c. Mcafee
d. Corel
67.World Wide Web(www) was made available in the internet in the summer of 1991 and was
developed by:
a. Tim Berners Lee
b. Jet Lee
c. Bill Gates
d. Ray Tomlinson
68. It is the year when the first microprocessor released in the market by Intel ?
a. 1970
b. 1971
c. 1983
d. 2005
69. Interaction between a CPU and peripheral device that takes place during the I/O operation is
known as
a. handshaking
b. footshaking
c. flagging
d. relocating
71. A system whereby computers and data storage are placed in dispersed locations is known as:
a. centralized processing
b. distributed data processing
c. summarizing
d. package software
72. Addressing in which the location of the data is contained within the mnemonics is known as
a. immediate addressing
b. implied addressing
c. associated addressing
d. direct addressing
73. Addressing in which the instruction contains the address of the data to be operated is known
as
a. immediate addressing
b. implied addressing
c. associated addressing
d. direct addressing
74. When all access and processing is done in one location, a computer system is said to be:
a. networked
b. centralized
c. distributed
d. linked
77. Most screen nowadays are LCD, what do you call the liquid crystal in the LCD?
a. pneumatic fluid
b. nematic fluid
c. clean and refreshing mineral water
d. plasma
81. A sum term that contains all the variables of a function in either complemented or
uncomplemented form.
a. Maxterm
b. Minterm
c. Product term
d. Midterm
82. A 12-bit microprocessor is capable of addressing 256K word memory, what is the length of the
accumulator?
a) 256 bits
b) 8 bits
c) 12 bits
d) 18 bits
86. Before a sequential file can be updated the transactions must first be________.
a. numbered
b. sorted
c. labeled
d. updated
90. It is the mechanism for reading or writing data on a disk is called a(n)
a. track
b. worm
c. key
d. access arm
91. NA 8-bit digital data 10101100 is fed to an ADC. The refrence voltage is +10 volts. The analog
output voltage will be
a. 6.7 V
b. 5.11 V
c. 0.039 V
d. 2.8 V
92. The process of detecting, locating and correcting logic errors is called_________.
a. desk checking
b. debugging
c. translating
d. documenting
95. What is the safest value of current which the human body can sustain for more than 3
seconds?
a) 1A
b) 0.5 A
c) 100 mA
d) 9 mA
96. If the resistance of the dry skin of a human body is 100 000 ohms, the resistance of the wet
body is
a) 100 000 ohms
b) 5 000 ohms
c) 5 000 000 ohms
d) 10 000 ohms
98. The process of allocating main memory to programs and keeping the programs in memory
separate from each other is called.
a. memory protection
b. virtual storage
c. memory management
d. utility program