COSC 100

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Using a 4 bit fixed point to represent fractions, what positional value is associated with the bit at the highlighted bit position? _ _ _ _ . _ _ _ _ ^

2 to the power -2

A kilobyte is exactly?'

2 to the power 10 bytes

A gigabyte is exactly?

2 to the power 30 bytes

What positional value is associated with the bit at the highlighted bit position? _ _ _ _ _ _ _ _ ^

2 to the third power

What is the largest unsigned integer that can be represented eight bits (keep in mind zero must be accounted for)?

255

Which of the following instructions (as described in the language description table) places 00000000 in register A?

2A00

Given the relation X below X: A B C 2 5 7 3 3 3 4 4 2 5 2 8 what value will be retrieved by the following query? SELECT B from X where B = C

3

How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8?

3

What is the values of 10000010 in excess 127 notation.

3

The nodes in which of the trees below will be printed in alphabetical order by the following recursive procedure? def printTree (Tree): if (Tree is not None): print(Tree.Value) printTree(Tree.Right) printTree(Tree.Left)

B / \ A C

Preconditions, postconditions, and loop invariants are examples of which of the following?

Assertions

Which of the following does not require a Boolean condition?

Assignment statement

Which of the following is not a control statement?

Assignment statement

Which of the following is not a means of repeating a block of instructions?

Assignment statement

Which of the following is not a role of a typical operating system?

Assist the computer user in the task of processing digital photographs

Which node is root of the tree following tree? B / \ A C / D

B

Which of the following instructions (as described in the language description table) is essentially an unconditional jump?

B033

What loads the initial part of the operating system in load into memory?

BIOS

What data type for a column in a database would be good to store a picture?

BLOB

The maximum rate at which data can be transferred is referred to as

Bandwidth

An operating system (or function of) where jobs are submitted to a job queue for later execution?

Batch processing

Which testing can be performed by select customers prior to the release of a product?

Beta

The EDVAC computer developed by Dr. John von Nueman is the what hat kind of machine?

Binary Based Computer

Which of the following concepts is not associated with critical regions?

Bootstrap

Ethernet is a means of implementing which of the following network topologies?

Bus

What kind of List adds a pointer to each record in memory where each pointer is used to point to the next record in the list?

Linked

Using an array of objects in memory where each position in the array represents the next stored item in sequence is one implementation of a?

List

Music that is stored as a sequence of instructions from which sound is synthesized is a _____ file?

MIDI

Which of the following is a means of encoding music?

MIDI

Which of the following is not a raster graphic encoding?

MIDI

Which of the following data storage systems is volatile?

Main memory

Which of the following data storage systems provides the most efficient random access to individual data items?

Main memory

Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system?

Maintain records regarding the ownership of files

Which of the following is not contained in a CPU?

Memory cell

Which of the following is a means of controlling the complexity of a software system?

Modularity

Seek time is the time to ___________.

Move the heads to the correct track

Under the assumption that N takes on only integer values, which of the following is the termination condition in the following recursive function? def myFunc(N): if (N < 5): print(N) else: myFunc(N - 1)

N < 5

Which of the following is the base case in the recursive function below? def xxx(N): if (N == 0): print(N) else: xxx(N - 1)

N = 0

Under the assumption that N takes on only integer values, which of the following is the termination condition in the following recursive function? def myFunc(N): if (N < 5): myFunc(N + 1) else: print(N)

N >= 5

The following truth table represents what operation? in1 in2 out 1 1 0 1 0 0 0 1 0 0 0 1

NOR

A good password must contain the following except:

Name, birthdate, nickname

Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?

Network

The insertion sort algorithm is an example of an algorithm in which of the following classes?

O( n2)

In general, an algorithm in which of the following categories is considered more efficient?

O(log2 n)

The binary search algorithm is an example of an algorithm in which of the following classes?

O(log2 n)

Suppose a binary tree contained the nodes W, X, Y, and Z, and each node had at most one child. How many leaf nodes would be in the tree?

One

Which of the following is not associated with the concept of data type?

Operator precedence

Which of the following is an example of a tree structure?

Organization chart

For the following circuit, what is the result of In 1 changing from a 0 to a 1?

Out is changed to 0

For the following circuit, what is the result of In 2 changing from a 1 to a 0?

Output is unchanged

Which of the following is an example of a language that is based on the functional paradigm?

PROLOG

The bus in a computer is an example of which form of communication?

Parallel

When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tom which of the following entries will be found most quickly using the binary search algorithm?

Pat

Which of the following is not a component of a machine instruction?

Port

Which of the following identifies the application to which a message arriving from the Internet should be given?

Port number

Which of the following is an activity?

Process

What is an algorithm that can be executed on a computer?

Program

Which of the following is a representation?

Program

Which of the following relational operations extracts entire columns from a relation?

Project

Which software engineering methodology rapidly develops a small portion of the systems, but may appear to be a near completed system? The implementation may evolve or it could be discarded.

Prototyping

Which of the following is a FIFO structure?

Queue

An ARM based processor is an example of what kind of computer architecture?

RISC

RLE(Run Length Encoding) is a data compression technique where data is compressed to store data value and the number of times it is repeated. For example, the following is the technique to represent white text on a black background: B = black pixel and W = white pixel BBBBBBWBBBBWWWBBBRLE data compression renders the above as 6B1W4B3W3B which is interpreted as a sequence of six Bs,one W, four Bs, 3Ws,etc. Which of the following is true about RLE?

RLE is lossless compressions because original data can be restored to original form using RLE decoding.

With what type of access can a seek to a new location in the file be performed before reading?

Random access

What is the part of a disk drive that detects the magnetized spots on the disk and magnetizes those spots?

Read/write heads

What kind of operating system enables a task to initiate immediate action in response to something happening now?

Real time

The Mark-I computer used what as its switching devices?

Relays

Eckert and Mauchly were acquired by what company that developed the UNIVAC computer, the world's first commercial computer, which was used to automate the census?

Remington Rand

What company was responsible for the first commercial computer in 1950 and sold about 40 of them for $1,000,000 a piece?

Remington Rand

Which graphical encoding is best for rendering pictures?

True type fonts are encoded using?

What core component of the operating system manages areas on the display screen and forwards keystrokes and mouse clicks to the appropriate process?

Window Manager

What was used to program Jacquard's loom?

Wooden cards

Under the assumption that X takes on only integer values, which of the following is the termination condition for the following loop? repeat: . . . until (X < 5)

X < 5

Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3 repeat: X = X + 2 until (X > 5)

X < 8

Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3 while (X < 5): X = X + 2

X <= 5

Which of the following set of instructions defines an algorithm in the formal, strict sense?

X = 3 while (X < 5): X = X + 1

Which of the following does not print the same sequence of numbers as the others?

X = 5

Under the assumption that X takes on only integer values, which of the following is the termination condition for the following loop? while (X < 5): . . .

X >= 5

The following truth table represents what operation? in1 in2 out1 1 1 0 1 0 1 0 1 1 0 0 0

XOR

Suppose a binary tree contained the nodes W, X, Y, and Z. If W and X were children of Y, and Z had no children, which node would be the root?

Y

Comments in a program should be all of the following except ______________.

a blog about your day

A finite sequence of executable steps that ultimately terminates and perform some task (solve some problem) is called _____________.

an algorithm

Select the correct choice that indicates the increasing level of abstraction in hardware

logic gates, chips, memory, motherboard

Which type of programming language enables new types to be defined that encapsulate both data and functions?

object-oriented

Consider two relays connected in parallel as shown below. This would form what logic operation?

or

Adding unsigned binary numbers 11111111 and 11111111 will encounter what kind of error if the result is to be stored as an eight-bit unsigned number?

overflow

Which of the following diagrams depicts a NOR gate?

picture of arrow and one dot at point

In evaluating an expression, what determines the order in which the arithmetic operations are performed?

precedence

What did Jacquard's loom, many early computers, the analytical engine, and the first machines to do the census have in common?

punched cards

Given the two relations X and Y below X: A B Y: C D 7 s t 3 2 z r 2 what value would be retrieved by executing the following SQL statement? SELECT Y.C FROM X, Y WHERE X.A = Y.D

r

If a stack contained the entries w, x, y, z (from top to bottom), which of the following would be the contents after two entries were removed and the entry r was inserted?

r, y, z

What can be built by a set of flip-flops?

register

What kind of database organizes information as a set of tables composed of rows and columns?

relational

What connects two networks of different types?

router

In which if the following states can there only be one such process per CPU core?

running

In Java and C curly brackets are used to identify what?

scope

The time it takes to access a disk has three time elements: _____ time, latency time, and data transfer time.

seek

Algorithms, programs, executables are collectively referred to as:

software

A development methodology that performs analysis, design, implementation and testing on a part of the system and then repeats the cycle multiple times is called?

spiral

Virtual memory is achieved by what?

swapping memory pages to and from the hard disk

What is an atomic set of database operations in which either all of the operations complete or none of them complete?

transaction

In a fourth-generation language, you specify...

what you want, not how

Testing which exploits knowledge of the internals of a software systems is called _______ testing

while box

If a queue contained the entries w, x, y, z (from head to tail), which of the following would be the contents after two entries were removed and the entry r was inserted?

y, z, r

Which of the following best describes the NOR operation?

An OR followed by a NOT

The end of a time slice is indicted by the occurrence of a signal called

An interrupt

Steve Woznick and Steve Jobs found what company with created the first single board computer?

Apple

The use of design patterns in software engineering was adopted from what other field?

Architecture

For the circuit shown below and the supplied inputs, what are the values of the outputs? (What is the values of the two question marks?)

1 1

In which of the following additions (using two's complement notation) does an overflow error occur?

0110+ 0011

What positional value is associated with the bit positioned above the ^ ? _ _ _ _ _ _ _ _^

2 to the 5 power

What is the result of the following subtraction problem (using two's complement notation)? 00001111- 10101010

011000101

Interpreting the bits in this problem as 2's complement numbers, what is the result of addition? 00110101 + 00110010

01100111

What mask in register F would cause the instruction 8AAF (refer to the language description table) to put a 0 in the most significant bit of register A without disturbing the other bits?

011111111

The bits 101 represent what value in excess 4 notation?

1

The bits 0011 represent what value in excess 4 notation?

-1

What decimal number is 2 to the power -3

0.125

Which of the following representations in two's complement notation represents the largest value?

00000010

If ODD parity is used, which 8-bit value should have its parity bit set to 1?

00000110

Which of the following bit patterns represents the value 9 in two's complement notation?

00001001

Which of the following bit patterns represents the value 26 in two's complement notation? Select one:

00011010

What is the result of: 000110+ 000011

001001

Which of the following bit-patterns represents the smallest value using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?

00101000

Assuming two's complement notation, what is the result of? 00110101+ 11111111

00110100

In which of the following addition problems (using two's complement notation) does an overflow error occur?

0100+ 0100

What is the result of: 000110 x 000011

010010

Using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess 4 notation, and the last four bits represent the mantissa, which of the following is the normalized representation of decimal 0.5?

01001000

Assuming that each of the following bit patterns originally had even parity, which one contains an error?

010011000

What value is represented by the bit pattern 01011100 when interpreted using floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?

1 1/2

Latency time is normally taken as the time it takes a disk to rotate ___________.

1/2 revolution

What mask in register F would cause the instruction 7AAF (refer to the language description table) to put a 1 in the most significant bit of register A without disturbing the other bits?

10000000

A7DF is the hexadecimal representation for what bit pattern?

1010011111011111

What is the result of the following addition problem (using two's complement notation)? 00001111+ 10101010

10111001

Which of the following is the binary representation of 6 5/8?

110.101

Which of the following bit patterns cannot be expressed in hexadecimal notation?

110011

Using an 8-bit floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess 4 notation, and the last four bits represent the mantissa (NO implied bit), what is the bit pattern that represents the value -1 3/4.

11011110

Which of the following representations in two's complement notation represents the smallest value?

11110000

Which of the following bit patterns represents the value -9 in two's complement notation?

11110111

Which of the following bit patterns represents the value -6 in two's complement notation?

11111010

FA7D is the hexadecimal representation for what bit pattern?

1111101001111101

Suppose a hard disk contains 5 platters with 400 tracks on each surface and 30 sectors in each track. How many total bytes does the disk hold, if each sector has 1000 bytes?

120,000,000

Which of the following is a possible LZW compression of the message -xyz xyz xyz-?

1234545

What is the largest positive integer that can be represented in 8-bit two's complement notation?

127

What is the value for 11010100 when interpreted as 4 bits fixed point?

13.25

If the longest path in a binary tree contained exactly four nodes, what is the maximum number of nodes that could be in the entire tree?

15

What is the largest integer that can be represented an unsigned binary integer notation in which each value is represented by 4 bits (don't forget to account for 0)?

15

Which of the following instructions will not produce the same result as the other two? (Refer to the language description table.)

1500

The first machine that had the functions of a modern computer was designed but was never built.

1840's

Which value cannot be accurately represented as a floating-point number.

30.20

Which of the following instructions (as described in the language description table) changes the contents of a memory cell?

30AB

How many different states can be represented by 5 bits?

32

How many different states can be represented by five bits?

32

The hexadecimal representation of an ASCII digit 3 is?

33

What unsigned decimal integer value is represented by the bit pattern 00100011?

35

What does a typical modern computer working with single precision arithmetic get when it adds 355.0 and 0.00000000000002 (Hint: think about how many digits of precision)?

355.0

The hexadecimal representation of an ASCII digit 9 is?

39

Given the relation X below X: A B C 2 5 7 3 3 3 4 3 2 5 2 8 what value will be extracted by the following query? SELECT A from X where B > C

4

Which of the following instructions (as described in the language description table) changes the contents of register 7?

4057

Given the relation X below X: A B C 2 5 7 3 3 6 4 4 2 5 2 2 what values will be retrieved by the following SQL statement? SELECT A, B FROM X WHERE X.B = X.C

5, 2

Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?

6 1/4

The IEEE standard for single-precision floating-point provides around ____ significant decimal digits.

7

What is the hexadecimal shorthand for this byte: 01111011 ?

7B

Which of the following bit patterns (represented in hexadecimal notation) represents a positive number in two's complement notation?

7E

If the main memory in a processor can store 256 unique address locations, how many bits are used to reference the locations?

8

Suppose a hard disk contains 2 platters with 100 tracks on each surface and 20 sectors in each track. How many total bytes does the disk hold, if each sector has 1000 bytes?

8,000,000

If register A contained the pattern 00000000, which of the following instructions could alter the contents of register 0? (Refer to the language description table.)

800A

Which of the following instructions (as described in the language description table) places 00000000 in register 5?

9555

What is XML?

A markup language the can be used to define specific vocabularies of tags and and is used for B to B (Business to Business) communication.

What is a Turing machine?

A minimal theoretical computer

Which of the following appears to be the most functionally cohesive?

A module that only records deposits to checking accounts

What is an internet/intranet?

A network of LAN's, MAN's and maybe WANs connecting computers within a company or organization.

Which of the following instructions will not produce the same result as the other two? (Refer to the language description table.)

A506

Which of the following instructions (as described in the language description table) will not change the contents of register 5?

A508

What is the hexadecimal shorthand for this byte: 10100110 ?

A6

Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two's complement notation? Select one:

A6

Which of the following instructions (as described in the language description table) is equivalent to requesting that register A be rotated to the left by three bits?

AA05

Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?

AND

What company retains the intellectual property for the design of microchips used in smartphones, satellite TV boxes, and other devices; the intellectual property is licensed to chip manufacturers?

ARM

Reena decides to write a procedure that will calculate the interior angle of a polygon. She asks the user for the number of sides and then prints an output that equals the angle measure. Writing a general procedure instead of finding interior angle for each individual polygon is called

Abstraction

What is the term for separating the use of components from the implementation details?

Abstraction

Who assisted Charles Baggage in explaining the Analytic Engine, she is considered to be the world's first programmer?

Ada Byron

By using a logarithmic scale, multiplication problems are solved using what mathematical operation?

Addition

Who invented Collosus, a machine used to decode messages in WW II that were encrypted by the Enigma machine? Alan Turing

Alan Turing

Which of the following lists would not be obtained at some point when applying the insertion sort algorithm to the list below? Sylvia Nancy Lois Alice

Alice Sylvia Nancy Lois

Select the correct choice that describes functions I. Functions are reusable programming abstractions II. Functions increase the complexity of writing and maintaining programs III. Functions reduce the complexity of writing and maintaining programs

All of the above

Which of the following best describes the NAND operation?

An AND followed by a NOT

The nodes in which of the trees below will be printed in alphabetical order by the following recursive procedure? def printTree (Tree): if (Tree is not None): printTree(Tree.Left) printTree(Tree.Right) print(Tree.Value)

C / \ A B

Which of the following is an example of a language that is based on the object-oriented paradigm?

C++

Which of the following storage systems is best suited for storing and retrieving long strings of data such as music that are processed in sequential order?

CDs/DVDs

Which of the following is not an application of the Internet?

CERT

Which of the following is a 3GL?

COBOL

Who was known as the Father of Computing for his design of the analytical engine?

Charles Babbage

What type of diagram may be developed during design that is used to identify the types of objects and their attributes, methods, and relationships is called what kind of diagram?

Class diagram

Which of the following is a means of resolving conflicts among data types?

Coercion

Which of the following is ignored by a compiler?

Comment statements

Which of the following is ignored by a compiler?

Comments

What company reversed engineered the ROM of the IBM personal computer that then opened up the personal computer clone market? Select one:

Compaq

Which of the following is an attempt to construct software from off-the-shelf components as is done in other engineering fields?

Component architecture

Relative encoding is?

Compression technique that uses differences between each values in sequence

A CPU core can only execute one process at a given time. However, execution may rotate between processes in the ready state by performing what upon a timer interrupt?

Context switch

A section of a program that should be executed by at most one process at a time is called a

Critical region

Which of the following is a binary search tree?

D / \ A T / \ E Z

Blaise Pascal creates the world's first?

D.Mechanical calculator

What is used by the file manager to store file attributes (e.g., file name, modify date) and identify which sectors on the disk compose a file?

Database

Which of the following is not a feature of UML?

Dataflow diagrams

Which of the following events is detrimental to an operating system's performance?

Deadlock

Which step of the machine cycle examines the op-code of the next instruction to be executed?

Decode

When searching within the list Lewis, Maurice, Nathan, Oliver, Pat, Quincy, Roger, Stan, Tomwhich of the following entries will be found most quickly using the sequential search algorithm?

Lewis

Defining how a system will be built is done during which phase of software development?

Design

Which of the following components of an operating system handles the details associated with particular peripheral equipment?

Device drivers

What is the component of the operating system kernel that performs a context switch?

Dispatcher

Which of the following components of an operating system is executed as the result of an interrupt signal?

Dispatcher

Which of the following is used to translate mnemonic addresses to IP addresses?

Domain Name server

Raster graphics is good at?

Drawing pictures

Eckert and Mauchy, working at the U. Penn., design what machine that uses Vacuum tubes as its switching device?

ENIAC

Suppose a binary tree is implemented as a linked structure in which each node contains both a left child pointer and a right child pointer. Which of the following statements is false?

Each left node in the tree is always at the end of a path that is as least as long as any other path in the tree.

The bit pattern 001010101101001011 may represent I. instructions II. data

Either I and II

What type of diagram may be developed during analysis, refined during design, identifies the data items of a system (what will be stored), and will be used to define the schema of a database.

Entity-Relation

Which of the following is not a step in the process of translating a program?

Executing the program

Which of the following is an Internet application that is named after its underlying protocol and is used to send/receive files?

FTP

Which of the following is not an activity performed entirely within a CPU?

Fetch instructions

Select the correct format in which a CPU executes an instruction

Fetch the instruction from memory, decode the bit pattern, perform the action

Which of the following components of an operating system is not part of the kernel?

File Explorer

What core component of the operating system manages the data on mass storage devices (e.g., disk drives)?

File Manager

Which of the following components of an operating system maintains the directory system?

File manager

Which of the following mass storage system does not require physical motion?

Flash drives

Procedures are also called as

Functions

Which of the following provides a compressed representation of an image by limiting the number of different pixel colors to 256, thereby enabling each pixel in an image to be represented by a single byte whose value indicates which of a palette of entries represents the pixel's color?

GIF

In which of the following locations is information most readily available for manipulation by the CPU?

General-purpose registers

Who is the person noted for finding the first computer bug (a moth) and for contributing to COBOL?

Grace Hopper

What application layer protocol is typically used to send a request to and receive web pages from a server?

HTTP

Which layer of the TCP/IP hierarchy actually transmits a message? Select one:

Link

Application software consists of programs for performing tasks specific to the machine's utilization. Some of the common application software found on a machine: I. Games (such as a Tank, Solitaire, etc.) II. Songs and movies III. Accounting program IV. Windows operating system

I and III only

A process that is blocked from execution until a requested output to a device is complete is in what state?

I/O wait

Which of the following is not a loop?

If -else statement

Which of the following file structures requires a small "auxiliary" storage system that must be updated as entries in the file are inserted or deleted.

Indexed

Positions within arrays are identified by means of numbers called

Indices

Data that is organized in a meaningful manner is called?

Information

What is a schema?

Information describing the structure of a database

Which of the following is a means of defining similar yet different classes in an object-oriented program?

Inheritance

Which standards body defines standards for floating-point numbers?

Institute for Electrical and Electronic Engineers (IEEE)

Jack St. Clair Kilby invented what, which has many embedded transistors?

Integrated circuit

Which Standards Body defines Unicode

International Organization for Standards (IS0)

A single bit can be used to represent which of the following:

Invoice paid

Who In the 1600's discovered logarithms?

John Napier

Which of the following relational operations combine data from more than one relation?

Join

The central part of an operating system that provides a set of integrated services is called?

Kernel

Which of the following instructions does not fall in the category of arithmetic/logic instructions? Select one:

LOAD

Google was founded by who?

Larry Page and Sergey Brim

Batch processing is appropriate for these applications, except ______________.

Reservations

Which of the following is not associated with object-oriented programming?

Resolution

Which of the following connects existing networks to form an internet?

Router

Which of the following is not a form of parallel processing?

SISD

What is the acronym for the programming language used to access and update a database?

SQL

Which of the following relational operations extracts entire rows from a relation?

Select

Which of the following is a technique for controlling access to a critical region?

Semaphore

Reading a file processing one record at a time, one after another in the order in called?

Sequential access

The visible portion of the operating system from which a user can view the file system and request that programs be executed is called what?

Shell

Which of the following items of information would not be contained in an operating system's process table?

Size of a program as stored on disk

_________________ is collectively the methodologies and tools used to develop large software systems

Software Engineering

Which of the following is not constructed by a typical compiler?

Source code

Which of the following is not an advantage of a database system over a file system?

Speed of access

Suppose you were going to retrieve items of data that you would later need to process in the opposite order from that in which they were retrieved. Which of the following would be the best structure in which to store the items?

Stack

What data structure is associated with the actions "push" and "pop"?

Stack

Which of the following is a LIFO structure?

Stack

Which of the following is not a way of representing algorithms?

Stepwise refinement

Which of the following is a way of testing the design of a software system?

Structured walkthrough

For a student table, what field would be a good candidate for the primary key?

Student id

Which of the following describes only the portion of a database available to a particular user? Such portion provides enhanced security.

Sub-schema

Which of the following is most likely an example of a many-to-many relationship?

Subscribers and magazines

The following programming language statement has an error - a missing right parenthesis. What type of error is it (hint: the symbols the program do not conform to the required order)?

Syntax

What network technology provides transmission of messages over a network that is reliable, but not efficient?

TCP/IP

What is markup?

Tags used to annotate content within web pages or other internet documents.

Run length encoding is?

Technique for compression

Which of the following is not represented in a class diagram?

The number of instances each class will have

Which of the following is the scope of a variable?

The portion of the program in which the variable can be accessed

William Shockley is noted as the Father of?

The transistor

Who invented the WWW?

Tim Berners-Lee

Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?

Transport

What network technology can broadcast messages over a network that is efficient, but not reliable?

UDP

UML stands for what?

Unified Modeling Language

Testing execution of functions/methods is called?

Unit Testing

Which of the following is not involved in a context switch?

User Interface

Which graphical encoding is best for drawing scalable diagrams?

Vector graphics

Which of the following is not a means of performing multiple activities at the same time?

Virtual memory

What standards body defines HTTP and HTML?

W3C

Music that is stored as a sequence of numbers captured by sampling a signal many times a second is a _____ file?

WAV

Which of the following is the oldest approach to software development where each phase must be fully completed before proceeding to the next.

Waterfall

Which type of programming language has a one-to-one relationship between its statements and the machine language for the computer

assembly

Error correcting codes require selecting bit patterns so that ______________________ each pair of valid patterns, this is called the Hamming distance.

at least 3-bit differ between

What can a single flip-flop be used to represent?

bit

What is the shared set of wires connecting registers and memory?

bus

Unicode is a?

character set

The smallest number of sectors that a disk drive can transfer at a time is called a __________.

cluster

What translation program translates a 3GL program into instructions of a machine

compiler

When a variable/identifier is declared in a 3GL language, what is typically specified in addition to the name

data type

In a 3GL programming language declarative statements are used to:

define the variables that will be used by a program

If hexadecimal 67 is the pattern of the ASCII code for the letter g, then which character would have hexadecimal 65 as the pattern of its ASCII code?

e

If a class diagram indicates a one-to-many relationship between class X and class Y, then

each object of "type" X can be optionally associated with many objects of "type" Y.

What technology uses provides coordinated use of a network by allowing any computer to speak at a time, however, while one computer is speaking all others will wait and, in the event that two start speaking at the same time they both stop, wait some random amount of time and then attempt to speak?

ethernet

What term refers to the way numbers such as 0.00091, 3.14159 and 4637771000000000.0 are represented in a computer? (hint: it is like scientific notation, but in binary)

floating point

As dynamic data structures grow and shrink, storage space is used and released. The process of reclaiming unused storage space for future use is known as ____.

garbage collection

The physical components of a computer are called?

hardware

In the analysis phase, we are _________

identifying what is to be built

All of the following apply to assembly language, except...

includes if, while, and for statements

A program that directly executes a high-level language is called a(n)?

interpreter

If 01100100 is the pattern of the ASCII code for the letter d, then 01100110 represents what using the ASCII code (hint - the bit patterns for the lower-case letters are in sequence)?

letter f


Kaugnay na mga set ng pag-aaral

BUSI301: Business Law (B07) Chapter 2

View Set

Apex Spanish I Semester II 2.2.4

View Set

Ethernet max speeds and distance

View Set