Computer Programming Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The interaction between the actor and the system can be best described as: A Select Case. B Use Case. C User Case. D User Application.

B

In flowchart symbols, which symbol shows the input/output? A Parallelogram B Rectangle C Oval D Diamond

A

The programming process begins with a meeting between the programmer and the client. Which activity would be the second step in the programming process? A Designing the solution B Documenting the solution C Testing the solution D Validating the design

A

The purpose of the Use Case is to: A define the interaction between the user and the program. B define the requirements that the software is intended to perform. C describe the operation of a block of code. D provide documentation to the next programmer.

A

What does the example below represent? 1. Obtain two numbers from the user 2. Add the two numbers together 3. Print the two numbers A Algorithm B Coding C Flowchart D Pseudocode

A

What does the example below represent? 1. Obtain two numbers from the user 2. Add the two numbers together 3. Print the two numbers A Algorithm B Coding C Flowchart D Pseudocode

A

What is a list of instructions that contain data for a computer to follow called? A Computer program B Algorithm C Flowchart D Pseudocode

A

Which act gives law enforcement the ability to monitor individual's email and web activity? A Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001 B Right to Financial Privacy Act of 1978 C Consumer Credit Reporting Reform Act of 1996 D Privacy Act of 1974

A

Which step should not be taken when planning an application? A Code the user interface. B Design the user interface. C Identify the events required to trigger an object into performing its assigned tasks. D Identify the tasks the application needs to perform and the objects to which you will assign the tasks.

A

Why is a comment used in Visual Basic? A Allows the programmer to add documentation to a program B Serves as a user guide C Checks for logic errors D Explains logic to the users

A

In flowchart symbols, which symbol is used to show processes? A Parallelogram B Rectangle C Oval D Diamond

B

Jamie is careful to use non-offensive language and to be considerate of the feelings of others when she sends email messages. What does this behavior exemplify? A Information age B Netiquette C Online Profiling D Privacy

B

The information posted on the Social Security Administration website for public view and access is in compliance with which legislation? A Electronic Communications Privacy Act of 1986 B Electronic Freedom of Information Act of 1996 C Privacy Act of 1974 D Safety and Freedom through Encryption Act of 1999

B

The programming process begins with a meeting between the programmer and the client. Which of the following activities would be the third activity in the programming process? A Test the program B Write the program C Design the solution D Identify the problem

B

The text below is an example of what? Leave classroom Turn right out of school building Walk 1.2 miles Turn right on street Go to 4th house A Algorithm for driving to school from home B Algorithm for walking from school to home C Pseudocode for driving to school from home D Pseudocode for walking from school to home

B

What are multi-line comments called? A Multiple line B Block C Single line D Line

B

What are the methods to show the steps to solve a problem? A Algorithm, drawings, sequence B Algorithm, flowcharts, pseudocode C Algorithm, program code, structure D Labels, flowcharts, pseudocode

B

What best describes the output for the program designed below? Begin sum= number1 + number2 + number3 + number4 +number5 avg= sum/5 Print avg End A The average of six numbers B The average of five numbers C The comparison of five numbers D The total sum of five numbers

B

What is an advantage of using modularization in computer programming? A Anyone who codes can work on the solution. B Each sub-problem can be solved in a few steps. C More programmers are required to solve the problem. D More time can be spent programming the solution.

B

What would best replace the "?" on Line 4 in the figure? Begin get x get y ? sum= x + y + z print sum End A get x + z B get z C print x D print y

B

Which act requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent? A Electronic Communications Privacy Act of 1986 B Children's Online Privacy Protection Act of 1988 (COPPA) C Right to Financial Privacy Act of 1978 D Consumer Credit Reporting Reform Act of 1996

B

Which act requires federal agencies to develop, document, and implement an agency-wide program to provide information security? A Electronic Communications Privacy Act of 1986 B Federal Information Security Management Act of 2002 C Identity Theft Penalty Enhancement Act of 2004 D Privacy Act of 1974

B

Which design approach should be considered when several programs all require similar functionality? A Menu B Object-oriented C Procedural D Subclass

B

Which law requires that a government authority have a subpoena, summons, or search warrant to access an individual's financial records? A Fair Use Act of 2007 B Right to Financial Privacy Acts of 1978 C Electronic Freedom of Information Act of 1996 D Fair Credit Reporting Act of 1970

B

Why is documentation of programs important? A It is required for successful compiling. B Programs may not make sense without proper documentation. C It turns the code blue. D The compiler reads it and adds the documentation to the code.

B

How do algorithms and cooking recipes compare? A Algorithms are long and recipes are short. B Both are always easy to follow C Both are sequences of instructions. D Recipes are detailed and algorithms are not.

C

In flowchart symbols, which symbol represents the start and the end process? A Parallelogram B Rectangles C Ovals D Diamonds

C

What is a set of steps that create an ordered approach to a problem solution called? A Pseudocode B Flowcharting C Algorithm D Modularization

C

What is an acceptable comment for second line of the Visual Basic program below? A !Execute a simple message box that will say "Hello, World!" B //Execute a simple message box that will say "Hello, World!" C 'Execute a simple message box that will say "Hello, World!" D Execute a simple message box that will say "Hello, World!"

C

Which act gives individuals the right to see information maintained about them? A Electronic Communications Privacy Act of 1986 B Federal Information Security Management Act of 2002 C Consumer Credit Reporting Reform Act of 1996 D Privacy Act of 1974

C

Which describes a program designed to reproduce itself by copying itself into other programs without the user's knowledge? A A bug B A reproduction C A virus D An infection

C

Which is a netiquette guideline? A Never change your password. B Access the account of another user. C Do not attempt to access the account of another user without authorization. D Share your password.

C

Which is not a characteristic of commenting? A Comments can be on their own line or after a line of code. B Comments begin with a '. C Comments begin with a ". D Comments will turn the text green.

C

Which is not an expectation for commenting? A Not every line should be commented, but any line that performs an operation should be. B Any line that causes confusion should be commented. C Comment every line. D At the top of the program, there should be comments on the purpose and scope of the program.

C

Why is a flowchart used to design a programming solution? A To eliminate possible syntax errors in the program solution B To input all code needed for programming the problem solution C To minimize logic errors by graphically showing steps in the solution D To show a list of all statements needed to solve the problem

C

In flowchart symbols, which symbol is used to show decisions? A Parallelogram B Rectangle C Oval D Diamond

D

Tricia decided that the computer program she was designing should be coded in Visual Basic. She then began to code the program from her pseudocode. This exemplifies which stage in the programming process? A Design the Solution B Identify the Problem C Test the Program D Write the Program

D

Using a program to record transactions, phone calls and other personal information is what type of ethical consideration? A Netiquette B Online Profiling C Phishing D Privacy

D

Which expresses the step-by-step instructions of an algorithm by using keywords, while depicting logical groupings or structures using indentation? A A flowchart B A storyboard C Methods D Pseudocode

D

Which of the choices below is not a Basic Control Structure? A Simple sequence control structure B Conditional control structure C Iteration control structure D Pseudocode control structure

D

Which project type is a desktop application run directly by the end user via forms appearing on the desktop? A Common application B Forms application C User application D Windows application

D


Ensembles d'études connexes

CK-12 Earth Science 7.3 vocabulary

View Set

Sexual reproduction in flowering plants

View Set

World History, Technological and Environmental Transformations, Pharaohs and Other People

View Set

AnaPhy Ch. 17 The Special Senses (second part)

View Set

Certified Revenue Cycle Representative Section 1 Cont.

View Set

AP Euro First Semester Final Review

View Set

Grammar & Composition II Unit 10

View Set

ESSENTIAL CELL BIOLOGY : ALL CHAPTERS COVERED

View Set