CSCI Exam 2
d. Nyquist rule
A digitization guideline which states that the sampling frequency should exceed the signal frequency by at least a multiple of two is the: a. Leibniz rule b. Analog-Digital rule c. Sample rate rule d. Nyquist rule
d. binary object file
A form of a program that is directly executable by a computer is a(n): a. device driver ffile b. high-level language file c. assembly file d. binary object file
b. provides guidelines for finding a solution
A heuristic process: a. is guaranteed to work 100% of the time b. provides guidelines for finding a solution c. yields the specified answer or reports back that no such answer exists d. All of these
b. 1/1,000,000,000th of a second
A nanosecond is: a. 1/1,000,000th of a second b. 1/1,000,000,000th of a second c. 1/100th of a second d. 1/1,000th of a second
Abstraction
A(n) abstraction is an idea or concept extracted from a specific situation.
d. brighten the image
Adding a positive number to each component of each pixel in an image will: a.improve the contrast of the image b. darken the image c. turn the image black d. brighten the image
b. various agents
Algorithms are used by: a. no one, they are just imagined solutions b. various agents c. only computers d. only web searches
d. use resources efficiently
Algorithms should: a. only be clear to the algorithm designer b. be ambiguous to allow creativity c. be written to solve one specific case d. use resources efficiently
Finiteness
An algorithm that has no successful end violates the _________ property.
b. a word that includes symbols or numbers to represent some letters
An example of a good password is: a. the user's birthday b. a word that includes symbols or numbers to represent some letters c. the user's nickname d. the user's pet's name
c. 212, 212, 212
Assume you have a scanned black and white photo and the subpixels had values of 195 each. You want the image's pixels to all be nearer intense white while keeping their relative relationships. Which of the following could the subpixels be changed to? a. 0, 0, 0 b. 179, 179, 179 c. 212, 212, 212 d. 0, 179, 212
b. get the sender's permission
Before forwarding email, you should: a. notify the sender that you are forwarding it b. get the sender's permission c. include a disclaimer d. All of these
d. sleep on it
Before sending or posting emotional content by email or online: a.send it to all the people you can think of who might be interested in your email b. remember that, since email is private, your thoughts will be secure c. send it quickly, before you change your mind d. sleep on it
b. four bytes long
Computer instructions are: a. one byte long b. four bytes long c. either bits long d. two bytes long
b. uses bits to represent both positive and negative values
Digitizing sound: a. achieves perfection using an unlimited number of bits b. uses bits to represent both positive and negative values c. is compressed using MPEG d. requires lossless compression techniques
b. is a lossless encoding scheme
GIF encoding: a. is used for photographs b. is a lossless encoding scheme c. was invented by the Joint Photographic Experts Group of the ISO d. can display 1024 different colors
a. use of the software
Generally speaking, a software license gives you: a. use of the software b. ownership of the software c. permission to resell the software d. all of these
d. The manufacturer uses techniques such as redundancy
How are hardware failures generally resolved? a. The manufacturer creates only unbreakable hardware b. The manufacturer tests using the specification c. The manufacturer employs a 24-hour support staff d. The manufacturer uses techniques such as redundancy
a. 16
How many bits does each hexadecimal digit require? a. 16 b. 2 c. 4 d. hex is not measured in bits
c. 8
How many characters are a good minimum length for a password? a. 6 b. 3 c. 8 d. 12
c. a few
How many instructions do computers know? a. a lot b. only one c. a few d. more than humans can count.
c. the same
If an algorithm is run at different times but with the same data the output will be: a. sometimes the same but not often b. different c. the same d. impossible to tell
c. Take a break and come back to try to solve the problem again later
If you have tried all the debugging steps you learned in this chapter and still can't fix the problem, what should you do before throwing up your hands in despair? a. Change to another computer b. Email your instructor and explain that you can't submit an assignment because your computer is broken. c. Take a break and come back to try to solve the problem again later d. Any of these
b. the Web Console
In Firefox, what tool can you use to see the errors on a web page? a. the Tech Support section b. the Web Console c. the Help menu d. Firefox has no such tool
d. the fact that the computer can refer to memory locations in any order
In Random Access Memory (RAM), what does the word "random" refer to? a. the fact that a request to memory might return the contents of any location b. the fact that memory units are unreliable and may return any value c. the fact that the amount of time required for the memory unit to respond is unknown ahead of time d. the fact that the computer can refer to memory locations in any order
d. fail-soft
In software, a program that continues to operate but with possibly degraded functionality is called: a. fault-tolerant b. fail-safe c. bug-safe d. fail-soft
c. fail-safe
In software, a program that stops operating to avoid harm is called: a. fail-soft b. bug-safe c. fail-safe d. fault-tolerant
c. loops
Instruction sequences that repeat are called: a. assumptions b. tests c. loops d. sorts
a. easy to forward
Most email is: a. east to forward b. subject to censorship c. copyrighted d. private
d. the infant mortality property
Most hardware failures caused by the manufacturing process show up after only a few hours of operation. This is known as: a. the early failure property b. the redundancy factor property c. the specification failure property d. the infant mortality property
b. allow several but not unlimited login attempts
Most login protocols: a. allow unlimited login attempts b. allow several but not unlimited login attempts c. shut off access after a single failed login attempt d. none of these
d. gigahertz
On the computer, one billion clock ticks per second is called a: a. nanohertz b. megahertz c. teragertz d. gigahertz
a. compiler
Software that translates a program written in a programming language into machine instructions is a(n): a. compiler b.browser c. driver d. algorithm
c. 5
The Hawaiian alphabet has 18 symbols. How many bits are needed to represent just these symbols? a. 16 b. 2 c. 5 d. 28
b. encodes letters as words
The NATO broadcast alphabet: a. is efficient in minimizing the amount of memory needed to store each letter b. encodes letters as words c. makes it difficult to distinguish between different letters d. encodes all digits using unusual names
b. is binary
The PandA system: a. contains gray b. is binary c. is formed from 256 letter representations d. has 10 digits
a. 5
The binary number 101 represents the decimal number: a. 5 b. 9 c. 3 d. 7
b. 001 1101 1100
The decimal number 174 is equivalent to binary: a. 1101 1010 b. 001 1101 1100 c. 1110 1111 d. 1010 1110
a. so the reader can tell whether or not the product is upside down
The familiar UPC bar code uses more than the minimum number of bits to code symbols: a. so the reader can tell whether or not the product is upside down b. so additional information can be coded c. so the code will fill up the required amount of space on the package d. to allow for expansion in the future
c. control unit
The hardware implementation of the Fetch/Execute Cycle is the: a. RAM b. peripheral c. control unit d. more input/output (I/O) ports
a. assembly
The lowest level programming language that humans use is: a. assembly b. C# c. Java d. binary
d. the interpretation placed on them by computer programs
The meaning of bits depends on: a. the principles applied by the transmission medium b. the ability to perform analog-to-digital conversion c. their inherent meaning d. the interpretation placed on them by computer programs
b. from a Monty Python skit
The origin of the word "spam" (used to describe junk email) is believed to be: a. unknown b. from a Monty Python skit c. a shortened form of the phrase "spurious messages" d. the nickname of a small town in Russia
c. 7-bit code
The original version of ASCII used: a. 4-bit code b. 8-bit code c. 7-bit code d. 16-bit code
b. hard disk
The peripheral used for both input and output is the: a. printer b. hard disk c. keyboard d. mouse
b. next instruction to be executed
The program counter keeps track of the: a. number of programs the computer is running b. next instruction to be executed c. number of memory addresses used d. current instruction in the Fetch/Execute step
c. sample rate
The quality of a sound recording is determined by the ________ and the sample precision. a. notification rate b. bit width c. sample rate d. sample speed
c. Web Console
To assist with HTML debugging, errors discovered by Firefox while rendering a page can be viewed by going to the: a. HTML Compiler b. HTML Debugger c. Web Console d. Diagnostic Analyzer
a. reCaptcha
To search for a word in a picture, pixels must be converted to: a. reCaptcha b. text c. analog d. bits
False
True or False: A bit is larger than a byte.
False
True or False: A heuristic process is an example of an algorithm.
True
True or False: A key property of the Presence and Absence (PandA) representation is that it is discrete. Either a phenomenon is present or it is not; either the logic is true or false.
False
True or False: A red, yellow, and green traffic light is a good example of a binary system.a. 5
False
True or False: Algorithms are only used in the field of computers; there is no use for algorithms anywhere else.
True
True or False: An algorithm is a systematic method to produce a specified result.
True
True or False: Blocks of four bytes are called words.
True
True or False: Debugging principles are not limited to use by IT professionals.
True
True or False: Debugging relies on logical reasoning and is learned by experience.
True
True or False: Digitizing a sound wave requires that the analog wave be converted to bits.
False
True or False: Each pixel on a computer display is formed from red, yellow, and blue colored lights.
False
True or False: Email backlogs should be answered in the order in which they were received.
False
True or False: Every memory location in the computer is numbered, starting with 0.
False
True or False: Extended ASCII is a 9-bit code.
False
True or False: Higher bandwidth usually means higher latency.
True
True or False: If your computer is not working, most likely it is your fault.
True
True or False: If your software is acting strange or your computer is behaving in a manner that seems unusual, you might have a computer virus.
True
True or False: In modern computer memory, each location is normally composed of one byte.
False
True or False: It is legal to give commercial software to your friends but not to sell it.
True
True or False: It is practically impossible to have 100% bug-free software.
True
True or False: It requires three bytes to represent the color of a single pixel.
True
True or False: Memory has a finite capacity.
False
True or False: Most email in the United States is a private conversation between the sender and the recipient.
True
True or False: Often fixing one error can reveal other errors you didn't realize were present.
False
True or False: One-way ciphers are reversible; they can be decoded.
True
True or False: RGB, the name for a color encoding method, is an acronym for Red, Green, Blue.
True
True or False: Running a program with the exact same data produces exactly the same results every time.
False
True or False: The ADD instruction adds the address numbers of the memory locations associated with the two values to be added.
True
True or False: The PandA unit is known as a bit.
True
True or False: The byte is the standard unit for computer memory.
False
True or False: The first step to take when debugging is to call tech support.
True
True or False: The sequence of commands is important in an algorithm.
True
True or False: The type of data, the mount of data, and the form of the data must all be specified when creating an algorithm.
False
True or False: The word netiquette refers exclusively to email etiquette.
False
True or False: There is only one possible algorithm that can be developed to solve each problem.
True
True or False: To play a digitized sound, the numbers are read from memory into a digital-to-analog converter (DAC) which creates an electrical wave that is input to a speaker.
False
True or False: Web pages cannot be copyrighted.
True
True or False: When you reply to an email, it is best to include the context of the message you are replying to.
d. include a ninth bit, set to 0
Using even parity, a normal byte, such as 1010 0011, would: a. use a ninth bit to determine which bit was changed if an error occurs b.include a ninth bit, set to 1 c. not use a ninth bit d. include a ninth bit, set to 0
c. American Standard Code for Information Interchange
What does ASCII stand for? a. Aspiring Students Confused by Incoherent Incantations b. Algorithmic Sequence of Computer Integrated Information c. American Standard Code for Information Interchange d. All Standards Complete Initialization Interface
b. checking that the error is reproducible
What is the first step in the debugging process? a. checking obvious error sources b. checking that the error is reproducible c. generating a theory to explain the problem d. isolating the problem
b. save your work with a new file name, exit, and restart
When you are working in a software program and it starts acting strange, you should: a. do nothing since minor glitches happen all the time b. save your work with a new file name, exit, and restart c. reinstall the software program d. immediately shut down the computer
c. Google
Which of the following is NOT an example of crowdsourcing? a. Freerice b. Foldit c. Google d. Be a Martian project
a. Add 1 to the total number of students registered
Which of the following is a good example of the effectiveness property of algorithms? a. Add 1 to the total number of students registered b. Enter the test score you may get on the next test c. Subtract the amount spilled from a glass of juice d. Any of these are good examples
d. Add values A and B, then divide by C. If C = 0, solution is "undefined."
Which of the following is an example of definiteness? a. Divide the result of values A and B by D b. Add and multiply values A, B, and C c. Use multiplication and addition to find the result of three values d. Add values A and B, then divide by C. If C = 0, solutions is "undefined."
d. You buy one copy of a computer game and install it on your laptop and your desktop computer.
Which of the following is probably legal? a. You buy a computer game and make copies for your friends b. You buy one copy of a computer game and install it on you laptop, your brother's laptop, and your computer at work c. You and your friends pool your money to buy a computer game and then share it by making copies for each of you d. You buy one copy of a computer game and install it on your laptop and your desktop computer
a. add two numbers together
Which of the following might be a single machine instruction? a. add two numbers together b. convert a decimal number to binary c. send a file to the printer d. request a new web page from a browser
c. OCR systems can easily interpret words created by reCaptcha
Which of the following statements id NOT correct? a. OCR's business applications include sorting mail and banking b. OCR can be used to read the handwritten digits on checks c. OCR systems can easily interpret words created by reCaptcha d. OCR is a very sophisticated technology
d. All of these are true
Which of the following statements is NOT true about algorithms? a. Problems can be solved by different algorithms in different ways b. Algorithms can be given at different levels of detail, depending on the abilities of the agent c. Algorithms always work d. All of these are true
b. phishing
You receive an email from your bank informing you that they are performing an audit and have found a problem with your account. They ask you in to help resolve the problem. This is an example of: a. spam b. phishing c. a legitimate email d. an advance-fee fraud
c. Parity
________ refers to whether a number is even or odd. a. The binary system b. PandA c. Parity d. The place system