option
Questions
ayuda
daypo
search.php

Assessments for Programming and Artificial Intelligence - Theoretical - 2025

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Assessments for Programming and Artificial Intelligence - Theoretical - 2025

Description:
General Education (First Secondary Grade) First Semester of the 2025/2026 Academ

Creation Date: 2025/11/21

Category: Computers

Number of questions: 145

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

A character code is a unique numerical value assigned to each character or symbol. True. False.

The ASCII system supports all the world's languages, including Arabic. True. False.

The Unicode standard aims to unify the representation of all characters in the world's languages. True. False.

Encoding is the process of converting numbers into readable characters. True. False.

In binary subtraction, borrowing is done from the higher digit when the current value is not sufficient for subtraction. True. False.

When adding two binary digits (1 + 1), the result is (10) in the binary system. True. False.

The letter "H" in the string "Hello" is represented in the hexadecimal system by the symbol. 65. 48. 6C. 6F.

Which of the following is not a character encoding system?. ASCII. Unicode. UTF-8. BIOS.

Which of the following causes character corruption?. A mismatch between the encoding and decoding systems. Weak processor speed. Different font types. Lack of random access memory (RAM).

In binary addition, the result of 1(2) +1(2 ) is: 0(2) with a carry of 1. 10(2). 2(2). 11(2).

The result of the binary subtraction 1010(2) – 0110(2) is: 0010(2). 0100(2). 0110(2). 1000(2).

To display characters on a computer screen, we need: Font only. Encoding only. Encoding + Font together. Hexadecimal system only.

What is the relationship between the 9's Complement and the 10's Complement?. The 10's Complement is the 9's Complement minus 1. The 10's Complement is the 9's Complement plus 1. The 10's Complement is the 9's Complement multiplied by 10. The 10's Complement is the 9's Complement divided by 10.

What is the One's Complement of the binary number 0101?. 0101 (2). 1011 (2). 1010 (2). 0110 (2).

In the method of subtraction using complements, which operation does a computer use instead of subtraction?. Multiplication. Division. Addition. Subtraction itself.

To calculate the 10's complement of the number 29, you first find its 9's complement, which is 70. What is the 10's Complement?. 70. 71. 69. 80.

To calculate the 9's Complement of a decimal number, you subtract each digit from: 10. 9. 5. 1.

How do you get the Two's Complement from the One's Complement?. By flipping the bits again. By subtracting(2) 1 from the One's Complement. By adding(2) 1 to the One's Complement. By ignoring the leading digit.

When subtracting using complements, what should you do with the final carry digit?. Add it to the next digit. Multiply it by two. Leave it as it is. Ignore it.

Based on the example in the file, what is the Two's Complement of the binary number 0101(2)?. 1010(2). 1011(2). 0101(2). 0001(2).

What is the 9's Complement of the number 635?. 635. 365. 463. 364.

In the binary system, what do you do to each bit to find the One's Complement?. Multiply it by 2. Subtract it from 10. Invert it (flip it) from 0 to 1 and 1 to 0. Add 1 to it.

In subtraction using complements, you must first find the complement of the: Subtracted from. Subtrahend. Final result. Leading digit.

In the decimal subtraction 8 - 6 using complements, you add 8 to the 10's complement of 6 (which is 4). What is the result of this addition before you ignore the carry digit?. 2. 4. 12. 8.

In the image digitization process, what is the unit, expressed in (dpi), that determines the image's resolution and clarity during sampling?. Encoding. Quantization. Resolution. The Pixel.

In usability techniques, what is the experience or emotional effect users get from interacting with a product or service?. User Interface (UI). Graphical User Interface (GUI). User Experience (UX). Affordance.

What is the main disadvantage of the Bitmap format compared to the Vector format?. It reduces the number of pixels in the image. It only allows for representing text and shapes. It causes symbols to appear unreadable when printed. Jaggies appear when the image is enlarged.

According to the LATCH principle, which type of classification is based on the sequence of events over time?. Location. Alphabet. Time. Category.

What is the term that refers to visually representing data to make it more understandable, with examples including tables, charts, etc.?. Abstraction. Pictogram. Structuring. Visualization.

In the 24-bit full color system, what is the number of color levels that can be represented for a single primary color (like Red)?. 8 levels. 24 levels. 256 levels. 224 levels.

What is the concept that refers to how easily data and services can be accessed by a wide range of people, including those with special needs?. Affordance. Usability. Accessibility. Universal design.

What are the three primary colors of light which, when mixed, increase in brightness and approach white?. Cyan, Magenta, and Yellow. Red, Green, and Blue. Violet, Yellow, and Black. White, Gray, and Black.

The smallest unit that defines the shape of a digital image, where the image is represented by its arrangement, is: Resolution unit (dpi). The Pixel. Sampling. Encoding.

What is the interface where icons and buttons are used in an easy-to-understand way to exchange information between humans and devices?. Command Line Interface (CUI). User Interface (UI). Graphical User Interface (GUI). User Experience (UX).

If the image size in pixels is X pixels (vertical) $\times$ Y pixels (horizontal), and each pixel is represented by Z bits, what is the correct equation that represents the data size (in bits)?. X x Y. X x Y x Z. Z. + ( X x Y). X x Y x {Number of primary colors}.

According to the LATCH principle, which type of classification is based on the differences between things and is used as an axis to distinguish domains?. Location. Alphabet. Time. Category.

A computer consists of five main components, which are: Control Unit, Arithmetic Unit, Memory Unit, Input Unit, Output Unit. Screen, Mouse, Printer, Keyboard, Storage Unit. Processor, Motherboard, Battery, Hard Drive, Screen. Input Unit, Output Unit, Network Unit, Cooling Unit, Arithmetic Unit.

Examples of input units: Screen and Printer. Keyboard and Scanner. Hard Drive and SSD. Speakers and Wireless Mouse.

The connection standard that transmits audio and video over a single cable is: USB. HDMI. Ethernet. VGA.

The relationship between the five computer components depends on: Data flow and control flow between the units. Only the speed of the hard drive. Screen size and display resolution. The type of operating system used.

The Control Unit and the Arithmetic Unit are known together as: Input Unit. Memory Unit. Central Processing Unit (CPU). Storage Unit.

The standard used to connect computers within Local Area Networks (LAN) is: HDMI. Bluetooth. Ethernet. USB.

USB is typically used to connect: Network devices only. Peripheral devices such as printers and keyboards. Internal storage units. Audio systems only.

The function of the Control Unit is: Executing instructions and issuing commands to the other units. Storing data temporarily. Processing data only. Outputting the final information.

Secondary memory is used for: Storing data temporarily. Executing instructions quickly. Long-term storage of data and programs. Controlling data flow.

Programs and data are stored temporarily in: Main memory. Secondary memory. Arithmetic Unit. Input Unit.

What is meant by an "Interface"?. A program that manages hardware. A component that mediates information exchange between the computer and peripheral devices. An internal storage unit. The operating system for peripheral devices.

The result of the following binary operation: 1010 + 0101 is 1111. True. False.

The result of the following binary operation: 0101 − 1011 is ………………. 0011. 0110. 0100. 1110.

Which of the following is considered a hardware component?. Operating System. Internet Browser. Excel Application. Central Processing Unit (CPU).

Which of the following represents 'Information'?. Raw facts. Something that carries meaning or value to the recipient. Unclear symbols. Only numbers.

Knowledge means: Copying information. Organizing and analyzing information to solve problems. Raw data. Rumors.

Which of the following is considered a primary source of information?. School textbook. A personal experience report. Daily newspaper. Television program.

Communication and transmission media include: DVD Discs. Radio and Television. Pictures and Texts. Cloud Storage.

Propagation and transmission media include: DVD Discs. Radio and Television. Pictures and Texts. Cloud Storage.

Which of the following is considered a violation of information ethics?. Verifying sources. Publishing copyrighted pictures without permission. Respecting privacy. Not using electronic passwords.

Which of the following is considered identity theft?. Sharing a video. Pretending to be someone else and stealing their account. Using a phone while walking. Spreading rumors.

Which of the following is considered basic personal data?. National ID number. Fingerprint. Date of birth. Health condition.

Which of the following rights protects the economic interests of creators?. Privacy rights. Copyrights. Advertising rights. Publishing rights.

The license that organizations obtain to confirm their commitment to data protection is called: Objection system. Privacy policy. Personal Data Protection License. Prior consent system.

Which of the following is considered secondary information?. Results of a new survey. Reports of personal experiences. A published scientific book. Field survey.

Which of the following rights is recognized by law and the judiciary?. Publishing rights. Copyrights. Intellectual property rights. Privacy rights.

The system that requires explicit consent from the user before providing a service is called: Objection system. Privacy policy. Prior consent system. License.

The binary number 10011010(2) is equivalent to which in the hexadecimal system: 9A(16). A9(16). 19(16). 91(16).

When converting the hexadecimal number A4(16) to binary, the result is: 10011010(2). 10100100(2). 11001001(2). 11100011(2).

Which of the following is an example of digital character encoding?. ASCII. Sans serif. Semi cursive. Font.

One of the causes of character corruption is: Weak processor speed. Mismatch between encoding and decoding methods. Low storage capacity. Different font types.

Which of the following elements are necessary to display characters on a computer screen?. Font only. Encoding only. Encoding + Font. Hexadecimal system.

The letter "H" in the string "Hello" is represented in the hexadecimal system by the symbol: 6C. 65. 48. 6F.

One-Time Password (OTP) means: A password that never changes. A password that can be used multiple times. A password that changes periodically and is used only once. A password based on the date of birth.

Which of the following is an example of knowledge-based authentication?. Fingerprint. Smart card. Password and PIN. SMS verification.

Two-step authentication relies on: Two different types of factors. Two pieces of information of the same type of factor. Fingerprint + password. SMS code + smart card.

The number of possible probabilities to represent 3 bits is. 2. 4. 8. 16.

The basic unit of information is. 1 megabyte. 1 kilobyte. 1 byte. 1 bit.

When converting the binary number 1011(2) to decimal, the result is. 10. 11. 12. 13.

The Patent Rights protection period is. 7 years. 10 years. 20 years. 50 years.

Which of the following is considered a neighboring right to copyright?. Design rights. Performers' rights such as singers and actors. Trademark rights. Utility model rights.

Which of the Creative Commons licenses allows the use of a work provided the author's name is mentioned?. Non-commercial (NC). No derivatives (ND). Credit to creator (BY). Same terms for adaptations (SA).

Which of the following malware replicates itself and spreads over the internet?. Trojan horse. Worm. Spyware. Ransomware.

Which of the following cybercrimes depends on using another person’s username or password?. Cybercrimes. Violation of the unauthorized access law. Manipulation of stored data. Phone fraud.

The purpose of copyright is: Ensuring fair use and protecting rights. Preventing all forms of quotation. Allowing infringement of intellectual property rights. Using works for commercial purposes only.

Which of the industrial property rights protects the external form or structure of a product?. Trademark rights. Design rights. Utility model rights. Patent.

The protection period of copyright lasts: The lifetime of the creator only. 20 years from the date of publication. The creator’s lifetime + 50 years after death. A fixed 100 years.

Which of the following threats collects personal information without the user’s knowledge?. Ransomware. Spyware. Viruses. Trojan horse.

What is meant by Software?. The hardware devices of the computer. The programs and data that run on the hardware. Only the computer's memory. The network components.

System software is used to: Operate and manage hardware. Create documents. Play video clips. Browse the internet.

What is meant by "System Software"?. Programs used directly by the user. Programs that control the operation of hardware and other programs. Programs for designing images. Programs for browsing the web.

Which of the following is considered system software?. Operating System. Excel program. PowerPoint program. Browser application.

Which of the following is not system software?. Windows. macOS. Photoshop. Linux.

Which of the following is considered application software?. Word. Windows. BIOS. Linux.

What is the function of the operating system?. Increase internet speed. Control hardware functions and run programs. Only save files. Temporarily shut down the computer.

Which of the following is an example of hardware?. Mouse. Word program. Operating System. Messaging application.

What does the term "Hardware" refer to?. Software. Digital data. The hardware devices of the computer. Programing instructions.

What is the relationship between hardware and software?. Hardware runs without software. Software runs on hardware to operate the computer. There is no relationship between them. Hardware is a part of software.

What controls the communication between hardware and software?. The Operating System. The user. The input unit. The screen.

What is meant by a Logical Operation?. A calculation using decimal numbers. An operation performed using binary numbers 0 and 1. A graphical process for drawing circuits. A process of storing data in memory.

A Logic Circuit is used for: Converting signals into images. Executing logical operations. Storing data. Sending data over the internet.

Which of the following gates outputs (1) only when all inputs are (1)?. OR. AND. NOT. XOR.

Which of the following describes the Inverter (NOT) circuit?. It outputs the same value as the input. It outputs the opposite of the input value. It outputs the sum of the inputs. It does not output any value.

Which of the following describes the function of an OR gate?. It outputs 1 only when all inputs are 1. It outputs 1 if at least one input is 1. It always outputs 0. It outputs 1 when the inputs are equal.

A Truth Table is used for: Storing data. Showing the outputs for all possible input combinations. Drawing circuits. Translating programs.

What is the output of an AND gate if the inputs are (1 and 0)?. 0. 1. 2. Nothing.

In the truth table for an OR gate, when the inputs are (0 and 0), the output is: 0. 1. Depends on the gate. Undefined.

What is the function of a Half Adder circuit?. Adding two decimal numbers. Adding two single-bit binary numbers. Subtracting two numbers. Converting one number to another.

What is the difference between a Half Adder and a Full Adder?. The Full Adder accounts for the Carry-in. The Half Adder is faster at calculation. The Full Adder uses only one input. The Half Adder only works for logical operations.

In a Full Adder circuit, the number of inputs is: 2. 3. 4. 1.

What is the output of a NOT circuit if the input = 1?. 0. 1. 2. Nothing.

In a Full Adder circuit, the symbol C refers to: Carry. Sum. A third input. Power line.

The function of a truth table is to: Show all possible input and output combinations. Save programming commands. Analyze images. Display only binary values.

The circuit that outputs the opposite of the input is called: OR. NOT. AND. XOR.

A Full Adder circuit handles: Only one bit. Two bits and three inputs. Two bits and only two inputs. Four inputs.

When adding 1 and 1 in the binary system, the result is: 0. 1. 10. 11.

The function of a Half Adder circuit is to calculate: The Sum only. Both the Sum and the Carry. Subtraction. Division.

The logic circuit that outputs 1 only when the inputs are different is called: XOR. OR. AND. NOR.

Which of the following describes a Full Adder?. It includes only two inputs. It includes 3 inputs and produces two outputs (Sum and Carry). It produces only one output. It does not contain an XOR gate.

In logic circuits, the value (1) means: False. True. Null. Off.

The number of possible combinations to represent 3 bits is: 2. 4. 8. 16.

Data are raw facts represented in the form of numbers, letters, or symbols. True. False.

One of the characteristics of information is that it completely disappears after being published on the Internet. True. False.

Secondary information is obtained from three parties such as books and research. True. False.

Videos, pictures, and texts are examples of communication media. True. False.

Videos, pictures, and texts are examples of Expression media. True. False.

Information literacy means the ability to interpret information accurately. True. False.

Respecting copyright and privacy is part of information ethics. True. False.

Internet addiction and using a phone while walking are among the problems related to smartphones. True. False.

Religion, health condition, and race are considered sensitive personal data. True. False.

Privacy policies in companies aim to explain how customer data is collected and protected. True. False.

The hexadecimal system uses numbers from 0 to 9 and letters from A to F. True. False.

When converting from binary to hexadecimal, the binary number is divided into groups of 8 bits. True. False.

ASCII code supports all languages, including Arabic. True. False.

Unicode standard was designed to collect character symbols from different world languages into one system. True. False.

Encoding is the process of converting digital data into readable characters. True. False.

Font is the shape data of characters corresponding to character symbols. True. False.

A password is a string of characters used to verify that a user is legitimate. True. False.

It is preferable for the password to be short so that it is easy to remember. True. False.

Biometric authentication relies on characteristics such as fingerprints and irises. True. False.

In two-factor authentication, two different types of factors are used for verification. True. False.

A bit can represent more than two states at the same time. True. False.

1 byte equals 8 bits and can represent 256 different probabilities. True. False.

Intellectual property rights are divided into industrial property rights and copyright. True. False.

Industrial property rights include patent Right and trademarks. True. False.

The Formality principle means that copyright is established only after officially registering the work. True. False.

Copyright is established at the moment of creation and does not require registration. True. False.

Confidentiality, integrity, and availability are essential elements of information security. True. False.

Ransomware is used to protect data and prevent loss. True. False.

Report abuse