CSE 3 Midterm
______ was a gifted computer programmer and "hacktiviist" who helped develop both Reddit and the RSS web service. a) Aaron Swartz b) Mark Zuckerberg c) Elan Musk d) Yan LeCunn
Aaron Swartz
____ is a self-contained step-by-step set of operations to be performed a) An algorithm b) A complier c) A programming language d) An operating system
An algorithm
Adding two inputs is a(n): a) Convolutional operation b) Logical operation c) Additive processing operation d) Arithmetic operation
Arithmetic operation
Which of the following is not a high level programming language? a) Assembly language b) Java c) Python d) all of these options
Assembly language
With microprocessors, The integration of a whole _____ onto a single chip or on a few chips greatly reduced the cost of processing power a) CPU b) Graphics card c) Transistor d) Diode
CPU
_____ is the fastest-growing literary genre in the history of the written word. a) Fanfiction b) Non-fiction c) Software documentation d) Young-adult fiction
Fanfiction
A(n) ______ is a type of display technology which uses liquid crystals in the video panel. a) LED b) CRT c) plasma display d) LCD
LCD
What is one of the main differences between LED/LCD and CRT monitors? a) LED/LCD use vacuum tubes and CRT monitors use flatscreen displays. b) LED/LCD are an older technology than CRT monitors. c) LED/LCD monitors are a type of flatscreen display and CRTs are not. d) LED/LCD are rectangular and CRT monitors are square.
LED/LCD monitors are a type of flatscreen display and CRTs are not.
Which of these operating systems is not driven by a graphical user interface? a) MS-DOS b) iOS c) Linux d) OS X
MS-DOS
Software _____is the illegal copying, distribution, or use of software. a) Piracy b) Subscription c) Cloning d) Decription
Piracy
A _______ is a code that consists of an array of white and black squares, often used for encoding URLs or similar information for reading by a smartphone camera. a) QR code b) zip code c) RQ code d) bar code
QR code
When you are working on an unsaved document on a PC, where is the document temporarily saved? a) The ROM b) The CPU c) The RAM d) The CD-ROM
The RAM
How long does an author's copyright last? a) The life of the author plus 70 years b) The life of the author c) 70 years d) 25 years
The life of the author plus 70 years
Which of the following does not constitute "Fair Use" of copyrighted material? a) These can all be considered Fair Use. b) Using a video clip as part of an online critique. c) Including pictures or audio from copyrighted material in an educational project. d) Parodying a piece of popular music.
These can all be considered Fair Use.
Which technology, after 1948, filled the role of vacuum tubes in computers? a) RAM b) Pneumatic tubes c) Transistors d) Solid state drives
Transistors
_____ is a character encoding system that can range from 7 to 32 bits which represent text and symbols used in a wide variety of languages worldwide. a) MPCS b) Unicode c) UCS d) ASCII
Unicode
How many bytes are in a gigabyte? a) a trillion b) a million c) an undecillion d) a billion
a billion
Unix is not: a) a free operating system b) at the heart of the Mac OS X c) a Multiuser operating system d) (none of these answers)
a free operating system
What is a user interface? a) a system that allows a computer and a user to interact and perform useful functions b) a social network like Facebook c) face recognition software d) a messaging service between users
a system that allows a computer and a user to interact and perform useful functions
A device driver makes it possible for _______. a) all of these answers b) the mouse to communicate with the OS. c) the OS to communicate with the graphic display. d) user input from keyboard to be relayed to the OS.
all of these answers
A _______ number is represented by a string of 0's and 1's (e.g. 1010). a) ternary b) binary c) hexadecimal d) fixed width
binary
What is typically the smallest addressable unit of memory on a computer system? a) byte b) nibble c) kilobyte d) bit
byte
_______ is the rate at which a computer's CPU executes instructions. a) bandwidth b) clock speed c) quartz timing d) performance rate
clock speed
________ uses shared computing resources instead of having local servers or devices to handle computing applications. a) cloud computing b) parallel processing c) social media d) a web service
cloud computing
A ______ controls how computer hardware communicates with the operating system. a) device driver b) command line interface c) power switch d) GUI
device driver
What does GUI stand for? a) graphical interface b) graphic utility interface c) graphical user interaction d) guess under inference
graphical user interface
The most common color printers are ____ a) laser printers b) inkjet printers c) plotter printer d) 3D printer
inkjet printers
Abandonware is software that: a) is ignored and no longer supported by its owners or creators. b) is licensed by Creative Commons. c) was released by its creators for free after being finished. d) cannot possibly be run on commercially available hardware.
is ignored and no longer supported by its owners or creators.
If a computer is part of a botnet: a) it is combining computing resources with other machines to process large amounts of data b) it is working with multiple sensor nodes to direct semi-autonomous mobile robots c) it is infected with some form of malware, allowing unauthorized individuals to control it d) it is sharing P2P data with a swarm of other users
it is infected with some form of malware, allowing unauthorized individuals to control it
The Amazon echo and Apple's Siri now use which input method? a) multi-touch screen b) mouse c) speech recognition d) QWERTY keyboard
speech recognition
One of the key advantages capacitive touchscreens have over resistive touchscreens is: a) they can be operated with a stylus or gloved hand b) their superior capacity for recognizing handwriting c) the ability to register multiple touches at once d) their lower cost
the ability to register multiple touches at once
Before his suicide in 2013 "Hacktivist" Aaron Swartz was facing 35 years in a Federal Penitentiary for: a) trying to share academic research journals with the public for free b) stealing intellectual property from the inventors of Facebook for financial gain. c) crashing the central credit card databases to delete all evidence of consumer debts. d) breaking into US government computers and posting documents to Wikileaks.
trying to share academic research journals with the public for free
Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to carry out a specified task, such as calculating employees' paychecks or printing students' report cards. a) Algorithms b) CPU c) Compilers d) Linkers
Algorithms
What types of creative work does copyright protect? a) All of these options b) video games c) software code d) architectural designs
All of these options
Which of the following online services or protocols has been using the most internet bandwidth since 2011: a) Netflix b) Facebook c) YouTube d) BitTorrent
Netflix
A(n) _______ is an electronic scanning system where marks are read from specific fields such as check boxes on paper. a) bar code reader b) OCR c) OMR d) QR scanner
OMR
These systems are helpful to people who cannot use their hands while they work: a) 3D printers b) Teleconferencing c) Speech recognition d) DSP chips
Speech recognition
Operating systems and utility programs are in a class of software known as: a) System software b) BIOS System c) Software suites d) Application software
System software
Which of the following is the standard (decimal) version of the binary number 110100? a) 52 b) 33 c) 12 d) 101010
52
In Freemium games, a "whale" is: a) Technically a mammal, not a fish b) A user who spends over 5x the average amount of time playing a game c) A high-spending member of a game's userbase d) A user whose technical support demands make them a financial liability
A high-spending member of a game's userbase