Computer Science Final quiz questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Select all that apply: which of the following can be considered typical processing instructions

1)compute the logical AND of two values 2)test if a bit is 0 and jump to a specific set of instructions based on the outcome 3)shift the bits of a word to the right, putting 0s on the left and discarding the bits on the right

assume you use the product operation on table A(5 attributes)X table B(3 attributes) the resulting supertable will have

8 attributes

Logic gates, part of a circuit in the ALU, are used to implement operations like AND and OR

True

generally speaking, a software license gives you

use of the software

Algorithms are used by

various agents

The speed of a computer is dependent on the number of cycles of what?

All of these(input system, operating system, fetch/execute cycle)

A form of program that is directly executional by a computer is called a(n)

Binary object file

In the united states the protection of an individuals privacy is the responsibility of the U.S government

FALSE

emptying the trash on your computer guarantees that the data has been erased

FALSE

it is better to write one email message that covers multiple topics than to write several messages, each covering one topic

FALSE

If you have a printer attached to your computer and then add a new pair of speakers, you will not need a device driver since you already have a device driver for the printer

False

The processors electronic clock is what shows you the current time on your computers desktop

False

To be effective, an algorithm relies on outside help to provide further input

False

A computers software stack

Features layers of software of increasing generality and sophistication

Select all that apply: which properties of a valid algorithm are violated by the instruction seen so often on shampoo hair bottles "lather, rinse, repeat"

Finiteness

The peripheral used for both the input and output is the

Hard disk

select all that apply. personal information can be tracked by

IP addresses, cell phone use, and cookies

In the fetch/execute cycle, the action of determining which operation is to be performed and computing the addresses of the operands occurs during the

Instruction Decode (ID) step

Instruction sequences that repeat are called:

Loops

Select all that apply: which of the following can complete the statement below? Different algorithms for the same problem can

Solve the problem differently

cookies can be used to track your online travels by using ad placement on various web sites

TRUE

A loop in an algorithm must also include a test which can end the repitition

True

Algorithms use functions(operations that the agent already knows how to perform) to simplify the algorithmic description

True

An algorithm is a systematic method to produce a specified result

True

Anyone who creates an algorithm needs to know why it works.

True

Every memory location in the computer is numbered, starting at 0.

True

It is possible for the output of an algorithm to be a statement that says there is no possible solution

True

Running a program with the exact same data produces the exact same results every time

True

The sequence of commands is important in an algorithm.

True

The type of data, the amount of data, and the form of the data that the algorithm expects. must be specified when creating an algorithm

True

rules for writing XML include

a required first line that identifies an XML file, tags and attributes are not case sensitive, and element names must begin with a special symbol

select all that apply: the encoding rules of XML include which of the following?

affinity rule:enclose all data that refer to the same thing in a pair of tags, identification rule: label data with tags consistently, and collection rule: group related instances

most login protocols

allow several but not unlimited attempts

if a cell points to cell $M3 this is an example of a(n)

an absolute reference to the column and a relative reference to the row

if a cell points to cell N$8 this is an example of

an absolute reference to the row and a relative reference to the column

An example of conditional formatting is:

applying a font color, e.g., green, to values over 500

backups on a personal computer

are just as essential to a personal system as a business system

companies that make products available as open source software

are promoting wide distribution of the software

An attribute or set of attributes that could potentially be chosen as the table's key is a:

candidate key

the basic unit of a spreadsheet is a

cell

select all that apply:personal information can be tracked by:

cell phone use, cookies, IP addresses

when choosing a password, a good way to help you remember it is to

choose something you are interested in and modify a phrase about that topic to obscure it

select all that apply. Which of the following activities creates an unnecessary risk of being blocked

clicking on a bank's URL instead of typing it in, sending information to a website that does not use an encryption, and responding through emails to specific requests for personal information

to select a range of cells

drag the cursor across the cells

most email is

easy to forward

which of the following is NOT difficult to convey in an email message?

emphasis

American privacy laws are much stricter than European privacy laws

false

The word netiquette refers exclusively to email etiquette

false

To successfully use a database, a user must be able to write SQL.

false

With stringent laws against spam in many places spam is no longer a common problem.

false

With stringent laws against spam in many places, and spammers being prosecuted, spam is no longer a common problem.

false

You cannot mix absolute and relative references in the same cell reference.

false

a program that determines is an email is spam is always accurate

false

a text file is the same thing as a tab-delimited file

false

a third party cookie is initiated by a direct request from the user

false

an XML file is an alternative notation for a database schema

false

hidden columns cannot be referenced in a formula

false

it is better to write one email message that covers multiple topics than to write several messages each covering one topic

false

it is legal to give commercial software to your friends but not to sell it

false

messages that are encrypted using public key RSA129 cryptosystem have, to date, not yet been cracked

false

the difference between a worm and a virus is that the worm program rides along with other software while the virus actually sends itself to other devices on the internet

false

the manner in which time is displayed in a spreadsheet is always in military format

false

web pages cannot be copyrighted

false

the origin of the word "spam"(used to describe junk email) is believed to be

from a Monty Python skit

which of the following is used to compute common summary applications in a spreadsheet

functions

before forwarding emails you should

get the sender's permission

a web page is transmitted securely when the protocol part of the URL is

https

information that you did not create but can treat as your own is said to be

in the public domain

the accuracy of personal information is the responsibility of the

individual

the most important advantage of public key encryption over private key is that

it does not matter if the bad guys find out the key used to encrypt messages

The processor clock

makes the machine cycle go on to the next step

unites states companies that operate in the EU

must handle EU customer data under rules negotiated between the US and EU

The program counter keeps track of the

next instruction to be executed

Suppose cell B4 has an entry. If the data in cell A4 is too wide to fit in the cell, it:

only part of the data will be visible but the rest of the data still exists

the design of a(n)_________ database is guided by technical considerations while the design of a(n)_________database is guided by the personal considerations of the user

physical, logical

the select operation on tables is often combined with the _______ operation to trim tables

project

identity theft is the crime of posing as someone else for fraudulent

purposes

logical tables are created from a

query

when you are working in a software program and it starts acting strange, you should

save your work with a new file name, exit and restart

the unites states approach of passing separate laws to govern privacy in specific industries or activities is called the _______approach

sectoral

select all that apply, which of the following may result from malware

secure information may be obtained from your computer, contents on your hard drive may be erased, and spam may be sent from your computer

what operations takes rows from one table to create a new table

select

a spreadsheet feature that allows the user to enter a series of numbers or dates into a range of cells is called a(n)

series fill

before sending or posting emotional content by email or online

sleep on it

select all that apply: which of the following are options that may be chosen in a two-factor authentication plan

something the user possesses(like a key), something the user is(like a fingerprint), and something the user knows(like a password)

XML tags cannot contain

spaces

the database schema or scheme

succinctly describes a database table, contains a list of attributes one per row, and specifies, for each attribute, its data type and whether or not it is the primary key

XML must be written using a

text editor

if the first character in a cell is an = sign

the cell contains a formula

select all that apply: which of the following statement is(are) TRUE about database tables

the columns of the database table contain attribute names, the database contains a set of things with common attributes, the rows of the database are entities

which of the following statements is NOT true

the rows of a database table do not have to be different, there can be two identical rows

what is the most common use for a spreadsheet

to process numerical data

A formula in a cell always starts with an equal sign.

true

Functions and column letters in a spreadsheet are not case sensitive.

true

If your software is "acting" strange or your computer is "behaving" unusually, these could be indicators of a software problem such as disk fragmentation.

true

If your software is "acting" strange or your computer is "behaving" unusually, you may have a computer virus infection.

true

XML is intuitive because it is a self-describing language

true

a database table is technically called a relation

true

a database table may not contain multiple identical rows, each row must be unique

true

a group of cells is called a range

true

a root element is the tag that encloses all of the content of an XML file

true

because there are two dimensions in a spreadsheet(columns and rows) there are actually two ways a formula can be relative

true

by default, a formula in a spreadsheet will automatically recalculate if any value contained in any of the formula's cell references changes

true

functions and column letters in a spreadsheet are not case sensitive

true

inconsistency is the main reason to avoid redundancy of information in a database

true

information placed in the public domain is free for anyone to use in any form

true

it is possible to figure out who is online with the help of internet service providers and companies like Microsoft

true

relationships connect rows of onwe table with rows of another table

true

the logical database shows the user the view of the information he or she needs and wants

true

the use of shareware implies an obligation to pay for it

true

two factor authentication allows for greater security in user access to web sites

true

viruses are often distributed through email attachments

true

when a new password is created for your computer system it is encrypted and then stored in that form

true

when you reply to an email, it is best to include the context of the message you are replying to

true

when the send button is clicked to send an email

two copies of the message are produced


Conjuntos de estudio relacionados

Enlightenment and American Revolution

View Set

Chapter 19: PrepU - Nursing Assessment: Hematologic Function

View Set

Chapter 1: Race in the Twenty-First Century, Soc 2 Chapter 6: Crime and Punishment, Race and Culture Chapter 4

View Set

Health Online- GROWTH, DEVELOPMENT, AND SEXUAL HEALTH-Sexually Transmitted Infections, HIV, and AIDS

View Set