CP Computer Science Chapters 1-2 Test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The textbook mentions that "Computers come with different default settings." What does default mean?

"What you get when you do not specify"

In Computer Science, ____ means on and ____ means off.

1; 0

How big was Harvard's Mark-I calculator?

51 feet long and 8 feet tall

What is the ASCII code for capital letter D?

68

How many bits are in a byte?

8

What is a bit?

A binary digit that is either 0 (off) or 1 (on) ( a binary digit is a single light representing a single digit in base-2)

What symbol is usually used to represent "The Internet" in a networking diagram?

A cloud

Describe a High-Level Language.

A language that uses English words as instructions

What does every digit in a base-10 number represent?

A multiple of a power of 10

What is a program?

A sequence of instructions, which enables a computer to perform a desired task

What is a peer-to-peer network?

A small group of computers with a common purpose all connected to each other

What is a server?

A specialty computer that is connected to the LAN for one or more purposes

Who is considered "The Father of Modern Computer Science" and "The Father of Artificial Intelligence"?

Alan Turing

On a Mac, what do you call a link to another file in another location?

Alias

List 3 ways that files in a folder can be sorted.

Alphabetically, oldest to newest, smallest to largest

Grace Hopper's immeasurable contributions to computer science have earned her the nickname "_______________ _______________".

Amazing Grace

What does ASCII stand for?

American Standard Code for Information Interchange

What type of device measures in a continuous fashion?

An analog device

Figure 2.13 shows 3 definitions for hierarchy. Which is most relevant for computer science?

An arrangement or classification of things according to relative importance of inclusiveness

What does computer hardware refer to?

Any physical piece of computer equipment that can be seen or touched

What common term is often used to refer to the application software found on a cell phone?

App

What was the first successful personal computer?

Apple-II computer

LISP is known for being one of the languages specifically designed to help develop _______ _______.

Artificial intelligence

Suppose you have 3 files in a folder named Bank.java, Bank.html, and Bank.jar. Assume filename extensions are disabled. If you open the folder, what would you see?

Bank, Bank, Bank

Blaise Pascal made an adding machine way back in 1642. Why were many people still using a plastic version of this ancient device in the 1970s?

Because a 4-function calculator could cost $150 or more

Why do some people credit Konrad Zuse as the "inventor of the computer?"

Because some people argue that the Z3 (Zuse's invention) was Turing Complete

What is the "exposure equation"?

Bewilderment + Exposure = Obvious

How many transistors can we fit on a tiny microchip today?

Billions

The number system used by computers is the _______ number system or _______.

Binary; base-2

Once World War II started, Enigma became much more complicated and codes were changed daily. What was the name of the improved decryption machine designed by Alan Turing?

Bombe

The CPU is essentially the _______ of the computer.

Brains

What language was created by combining C with OOP?

C++

What secondary storage devices are coded with areas that reflect and absorb laser light?

CDs or DVDs

What does CPU stand for?

Central Processing Unit

Which ASCII codes are used for the standard and extended sets of characters?

Combinations 0 through 127 are used for the standard set of characters. The second group, from 128 through 255, is used for the extended set of characters.

Computer Science is essentially _______________ _______________.

Computer programming

In what 3 areas are computers superior to human beings?

Computers are faster Computers are more accurate Computers do not forget

When a file is clicked in one folder and dragged to another there are 3 possible outcomes. List them.

Copy here, move here, create shortcuts here

The number system that we use is called the _______ number system or _______.

Decimal; base-10

What type of information allows you to make a precise copy of the original?

Digital information

What does programming in Machine Language entail?

Directly manipulating the 1s and 0s of the computer's binary language

Are filename extensions enabled or disabled by default?

Disabled

List 4 examples of internal peripheral devices.

Disk drive CD ROM drive Hard drive Network interface card

On a Mac, the bar with application icons at the bottom of the screen is called the _______.

Dock

What was the first electronic general purpose computer?

ENIAC (Electronic Numerical Integrator And Computer)

What was the first successful programming language?

FORTRAN

What is data?

Facts and statistics collected together for reference and analysis

What should not be on your Desktop?

Files

Where do files belong?

Folders

Why is Charles Babbage considered "The Father of Computers?"

For creating the first design of a general purpose computer

What language is used by all web browsers?

HTML

IBM's System/360 essentially standardized computer _______________.

Hardware

What was the first personal computer to be taken seriously as a business tool?

IBM P.C.

Where and when was the Abacus invented?

In the Middle Eastern area around 3000 B.C.

List 4 examples of how pre-historic people stored information:

In their heads, stories, legends, songs, carvings, paintings, and totem poles

After the data has been analyzed, and you reach certain conclusions, you now have useful __________ upon which you can make various decisions.

Information

What invention marks the beginning of "The Third Generation of Computers?"

Integrated circuit

Normally, businesses and schools have a series of LANs that all connect into a large network. What is this called?

Intranet

Why is it bad to remove a USB Drive from your computer without properly "ejecting" it first?

It can lead to corrupted files that cannot be opened later

Why was C very popular with professional programmers?

It combined the readability of high-level languages with the power of low-level languages, essentially becoming a "medium-level language"

A loom is a device used to make cloth. What was special about Jacquard's Loom?

It is one of the first examples of programming

Near the end of Lab Experiment #4, after deleting both files from Folder1, you double-click the Temp2 file in Folder2 for the second time. Explain what happens and why.

It is still able to be loaded because it is a copy from Folder1 which was deleted

What does a computer translator do?

It translates a high-level language into low-level machine code

How does an interpreter translate?

It translates one program statement at a time during execution

How does a compiler translate?

It translates the entire program into an executable file before execution

How is Assembly Language a little less tedious that Machine Language?

It used different symbols to represent different 4-bit combinations of 1s and 0s

Refer to the previous question. After that, you double-click the Temp3 -shortcut/alias file in Folder2 for the second time. Explain what happens and why.

It was unable to load because it was as shortcut to the file in Folder1, which was deleted

What is the first Platform Independent language?

Java

What does LAN stand for?

Local Area Networks

What coding machine was used by the Nazis in the 1940s which was even more complicated than the Enigma machine?

Lorenz SZ-40 Cypher

Refer to your answer to the previous question. What was the first operating system for this computer and which company made it?

MS-DOS by Microsoft

What was required to simply enter numbers into the Mark-I calculator?

Manipulating its 1,440 switches

What computer stopped working on September 9, 1947 when a moth got stuck in one of its relays?

Mark-II

FORTRAN was designed for which groups of people?

Mathematicians, scientists and engineers (for number crunching)

List 4 examples of external peripheral devices.

Monitor Printer Keyboard Scanner

What is the main board in a computer, with all the primary computer components, called?

Motherboard

Are computers more intelligent than human beings?

No

Can an iPad or a ChromeBook be used effectively in a computer science class?

No

Do computers have any creativity?

No

Is Computer Science the same thing as Computer Literacy or Computer Applications?

No

Is an iPad or a ChromeBook a full-fledged computer?

No

What does OOP stand for?

Object Oriented Programming

This information on a computer can be in many formats. List 5 examples.

Picture files, audio clips, programs, spreadsheet files, and text documents

Which country first "Broke Enigma" in 1932?

Poland

What powerful language was designed to be simple, like BASIC, but less "wordy" than Pascal?

Python

What kind of chip stores temporary information for the computer?

RAM chips

What kind of chip stores permanent information for the computer?

ROM chips

What does RAM stand for?

Random Access Memory

What does ROM stand for?

Read Only Memory

What was required to program the ENIAC?

Rewiring the machine

What is Sneaker Net?

Running around to share computer information

The slide rule was used for centuries. What 1970s invention finally replaced it?

Scientific calculator

What would cause 2 identical computers with identical operating systems to behave differently?

Settings are different, even though the computers are the same make and model, and have the same operating system

Why is Countess Ada Byron considered "The Mother of Programming?"

She developed certain programming ideas and techniques that are still used in programming languages today

Morse code is based on a series of _______ and _______ signals.

Short; long

On a Windows PC, what do you call a link to another file in another location?

Shortcut

Wireless connections are convenient, but there are some problems. List 2 of them.

Signals are not always reliable Security issues (easier to be hacked)

What are computer chips made out of?

Silicon

ASCII uses ____ byte to store one character and with that there are _______ possible characters.

Single; 256

List 2 human errors that can cause a computer to give erroneous information.

Sloppy data entry Improper environments for computers and diskettes and no sensible backup system

What is a fact?

Something that is indisputably the case

As of 2017, what is the fastest computer in the world?

Sunway TiahuLight Computer

What are the 2 most common applications for a computer?

System software and application software

On a Windows PC, the bar with application icons at the bottom of the screen is called the _______.

Taskbar

Which stores more information, gigabytes or terabytes?

Terabytes

What was the first commercially successful computer with the mouse/GUI technology?

The "Mac"

The Internet came about during what period in our history?

The Cold War

Refer to your answer to the previous question. What computer was used by British code breakers to help decrypt the secret coded messages from this device (the one used by the Nazis in the 1940s which was even more complicated than the Enigma machine)?

The Colossus computer

The 1880 Census took 8 years to complete. The US Government was very concerned that the 1890 Census would not be completed by 1900. What did Herman Hollerith invent to solve this problem?

The Tabulating Machine

COBOL was designed for which group of people?

The business community

What do the Turing Machine and the Von Neumann Architecture have in common?

The computer stores both the program's instructions and its data in RAM

What 2 things is the Compaq known for?

The first portable computer The first computer to be 100% compatible with an IBM PC

What does application software refer to?

The instructions that the computer requires to do something specific for you

What does system software refer to?

The instructions that the computer requires to operate properly

In terms of programming, what is the difference between a user and a provider.

The program (computer application / cell phone app) or webpage that makes the data available is the provider of the information whereas anybody who accesses data, in any of its many forms, is a user of the information.

In terms of the Internet, what is the difference between a user and a provider.

The program (computer application / cell phone app) or webpage that makes the data available is the provider of the information whereas anybody who accesses data, in any of its many forms, is a user of the information.

What does computer software refer to?

The set of computer instructions which make the computer perform a specific task

According to the author, what is one of the most important elements of learning in a classroom?

The student-teacher relationship

Why are Machine Code and Assembly Language considered "low-level languages?"

They function at, or very close to, the level of 1s and 0s

What is the most important aspect of this course?

To learn how to give correct and logical instructions to a computer with the help of a programming language

What invention marks the beginning of "The Second Generation of Computers?"

Transistors

A computer is _______________ _______________ if it can solve any computational problem provided memory and execution time are not issues.

Turing Complete

The secret of Morse code is the fact that electricity can be ______ ___, and it can be ______ ___.

Turned on; turned off

Unicode uses ____ bytes to store one character and with that there are _______ possible characters.

Two; 65,536

What was the first commercially available computer?

UNIVAC I (UNIVersal Automatic Computer)

What invention marks the beginning of "The First Generation of Computers?"

Vacuum tubes

Describe a Very-High-Level Language.

Where you program with pictures instead of words (ex: Lego NXT)

List 3 major operating systems.

Windows UNIX Linux

What company developed mouse technology?

Xerox Corporation

Is it possible to count in other bases besides base-10?

Yes

Using dots and dashes, write your first name in Morse code.

_ . _ _ . _ .... . . _ . .. _ . .


Kaugnay na mga set ng pag-aaral

Chapter 13: The Aggregate Demand-Aggregate Supply Model

View Set

Class 5b: Job Design & Job Crafting (Ch. 6)

View Set

Unit 8: Building Systems & Environmental Awareness

View Set

Valence Electrons and Electron Dot Diagrams

View Set