Computer Science Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Like _____, hard disks store data magnetically.

- Floppy disks - Zip disks

How many things can be represented in 4 bits?

16

The method that creates an object based on a class definition is called ____________.

A constructor

if-else statement

A selection statement that allows a program to perform alternative actions based on a condition.

Which gate produces a 1 only if all its inputs are 1 and a 0 otherwise?

AND Gate

___________ is an ordered collection of unambiguous, executable steps that defines a terminating process.

Algorithm

Which of these is necessary to protect your computer from security threats such as viruses and trojan horses?

Antivirus, firewall software, and updating the OS

A _____ is the smallest unit of data a computer can process.

Bit

Which of the following is an example of a language that is based on the imperative programming paradigm?

C

Which of the following is not an application of the Internet? (These are applications of the internet FTP, email, or Telnet)

CERT

The component inside of the computer that executes program instructions and performs calculations is the:

CPU

Which of the following is a task that is not performed by the kernel of an operating system?

Communicate with the user

A(n) __________ is a special method in a class—it is executed automatically when a new object is instantiated.

Constructor

List the steps for converting a binary number to its negative two's complement value in base-2.

Copy the bits from right to left. After copying the first bit that is a 1, reverse all the remaining bits.

When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.

DNS Server

Which of the following events is detrimental to an operating system's performance?

Deadlock

Data is stored inside of the computer in the form of 0's and 1's. This is referred to as:

Digital Form

Given the following S/R Latch and the information that S and R are currently 1, X is 0 and Y is 1, what would need to be done to set the X output line to 1?

Drop S (or the top) low momentarily

The process of encoding information that is passed over the Internet to prevent others from seeing it is called:

Encryption

A means of implementing a network with the bus topology is __________________ .

Ethernet

The smaller the distance between pixels on a monitor, the less clear the image.

False

Which of the following federal laws regulates the disclosure of student records?

Family Educational Rights and Privacy Act of 1974

What do we call the representation of a real number that keeps track of the sign, radix, mantissa, and the exponent?

Floating Point Notation

_____ is copyrighted software provided at no cost to a user by an individual or a company.

Freeware

With a _____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.

GUI (Not Command Line Interface)

A _____ occurs when a read/write head touches the surface of a hard disk platter, such as that shown in the accompanying figure, usually resulting in a loss of data and sometimes loss of the entire drive.

Head Crash

What is the relationship between A and B in the UML class diagram below? A ^ | B

Inheritance

On a CPU, what is the name of the register that contains the instruction currently being executed?

Instruction Register

_____ is/are the steps that tell the computer how to perform a particular task.

Instructions

A(n) __________ error occurs whenever the program successfully terminates but does not successfully complete the task.

Intent

The major carriers of network traffic on the Internet are known collectively as the _____.

Internet Backbone

A ______________ is used to translate a computer program into machine language so it can be executed.

Interpreter and Compiler

A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.

LAN (Local Area Network)

The _____ defines a popular video compression standard.

MPEG (Moving Pictures Experts Group)

Examples of nonvolatile storage media include all of the following except _____.

Memory

Two inputs, one source on top, one ground, and one output

NAND

Which of the following is used to translate between IP addresses and mnemonic addresses?

Name server

A collection of two or more computers or devices that are connected in some fashion and can communicate with one another is called a:

Network

The following Boolean expression represents which gate? X = A + B

OR

_____________ have two capabilities: they do things and they remember things.

Objects

Two types of system software are _____.

Operating systems, utility programs

_____ is mass produced, copyrighted retail software that meets the needs of a variety of users, not just a single user or company.

Packaged software

What do we call a variable that is used to pass information to a function?

Parameter

The _____ is the destructive event or prank a malicious-logic program is intended to deliver.

Payload

In the Architecture for the Machine from Appendix C, what is the name of the register that contains the address of the next instruction to be executed?

Program counter

_____ is free software, but it has been donated for public use and has no copyright restrictions.

Public Domain Software

_____ is the most common type of volatile memory.

RAM

Programs and data are held in this hardware component when the machine is turned on. The CPU accesses programs and data that reside here. If the power is turned off, all contents are erased. This component is:

Random Access Memory (RAM)

Which of the following is NOT associated with object oriented programming?

Resolution

Which of the following is not a way of classifying networks?

Router versus bridge

_____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.

Secure HTTP (S-HTTP)

In a ______ circuit, the output is determined by the input as well as the existing state of the circuit.

Sequential

____ is copyrighted software that is distributed free for a trial period.

Shareware

All of the following are advantages of networks except: (Communication, shared hardware, and shared data are advantages)

Software Debugging

On a _____, all of the computers and devices (nodes) on the network connect to a central device.

Star Network

Which are network topologies (may be more than 1 answer)? (Not cloud or packet)

Star and Bus

The part of a computer program that says how the instructions of the language can be put together is called ______________.

Syntax

The processor, memory, and storage devices are housed in a box-like case called the ____.

System Unit

Internet transmissions commonly use _____.

TCP/IP

This sub category of malicious logic program pretends to be legitimate software or data and sneaks into a computer.

Trojan Horse

As a rule, employers and colleges can monitor the Internet usage of employees and students.

True

No single person, company, institution, or government agency controls or owns the Internet.

True

System software serves as the interface between the user and/or application software, and the computer s hardware.

True

To input video from analog devices, the analog signal must be converted to a digital signal.

True

To use application software, a computer must be running system software, specifically, an operating system.

True

Your computer can contract a virus from a Web site by just visiting the home page of the Web site with your browser.

True

When someone uses a computer and/or network without permission or for a purpose that is prohibited, this is referred to as:

Unauthorized use and access

_____ is one of the most widely used coding schemes used to represent text data.

Unicode

A URL is:

Uniform Resource Locator, the address of a Web resource

One popular use of the _____ standard is in public Internet access points that offer mobile users the ability to connect to the Internet with their wireless computers and devices.

WiFi

A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.

Worm

The following truth table represents which gate? A B X 0 0 0 0 1 1 1 0 1 1 1 0

XOR

Each of the following is a commonly used output device except _____.

a scanner

A program is _____.

a series of instructions that tells a computer what to do and how to do it

The Internet is:

a worldwide network of computers

Programs such as Microsoft Word are classified as __________ software.

application

A good practice is to ________________ data and information on a regular basis to guard against system failure or security breaches.

back up

A nanosecond (abbreviated ns) is one _____ of a second.

billionth

In a _____, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions

command-line interface

The For statement...

executes a block of code many times.

In the machine cycle, _____ is the process of obtaining a program instruction or data item from memory.

fetching

The wider the bus, the _____ the transfer of data.

fewer the number of transfer steps required and the faster

Setting a monitor to display a higher resolution uses a _____.

greater number of pixels and thus provides a smoother image

To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment.

hardware theft

In a Web address, the _____, is a set of rules the defines how pages transfer on the Web.

http, which stands for Hypertext Transfer Protocol

The World Wide Web uses ________ to allow users to jump from one site to another.

hypertext links

The purpose of computer security is to _____________________________ .

maintain computers and networks that are operationally reliable and secure the confidentiality of the information that computers and networks handle

Desk checking, walk-throughs, and inspection are ______________ .

methods useful for verifying correctness of algorithms.

The design of computers, devices, and media in a network, sometimes called the _____, is categorized as either client/server or peer-to-peer.

network architecture

Tape _____.

no longer is used as a primary method of storage but is used most often for long-term storage and backup

A(n) ____ is system software.

operating system

A CD or DVD is an example of:

optical storage

What is the top level domain in the URL "http://www.apa.org/"?

org

All of the following are widely used input devices except the _____.

printer and monitor

The programming control structures used in a procedural programming language are:

sequence, repetition, decision

The difference between a Do loop and a While loop is _______________________.

the Do loop checks the condition after the loop runs once, but the While loop checks the condition before executing any instructions.

Memory stores _____.

the operating system and other system software, application programs that carry out a specific task, the data being processed and the resulting information

The Internet can be generally characterized as

the world's largest network


Kaugnay na mga set ng pag-aaral

Chapter 3 - Proteins, Carbohydrates, and Lipids

View Set

Population Health Nursing: Planning Nursing Care

View Set

Nutrition/Vitamins, Minerals, Fatty Acids, Amino Acids,

View Set