CS 1030 Weber State Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not one of the bus signal groups?

Fetch

Which of the following is not one of the OSI model layers?

Wireless

Inputs of 1 and 0 to an XOR gate produce what output?

1

What is the binary equivalent of the decimal number 543?

1000011111

What is the final result of the expression 5 + 2 * 4 - 2?

11

What numeric value in base 10 does the binary number 10000001 represent?

129

What base 10 value is equivalent to 3C0D16?

15,373

What is the positional value of the A in the hexadecimal number BEAD?

16

What is the final result of the expression 5 % 4 + 3 -2?

2

What is the positional value of the 1 in the binary number 100000?

32

What base 16 value is equivalent to the decimal number 1234?

4D2

What is the largest NUMBER OF ITEMS that can be represented with four hexadecimal digits?

65,536

What is the minimum number of bits required to represent 256 colors?

8

Which of the following standards is used in wireless networking?

802.11

Which HTML tag is used to provide links to other pages?

A

What does the subscript 16 indicate in the number C4A6 16?

A base 16 number

A design document is used to:

A blueprint that shows an application's functionality

Which is NOT a step of the database design process?

Add the data

In a computer, what function does a decoder usually perform?

Addressing memory

Which is NOT a type of control structure?

Algorithm

Name the four important elements of Babbage's Engine that are components of today's computer.

An input device, memory, a central processing unit, an output device

What is the likely motivation for a directed hacker?

Anger, greed, politics

A(n) __________________ is a data structure consisting of contiguous memory locations.

Array

UML was designed to:

Assist developers in creating visual models of the application's functionality

The ____________________ contains instructions and data that provide the startup program for a computer.

BIOS

A ______________________ in computer terminology is a set of wires and protocols designed to facilitate data transfer.

BUS

A(n) _______________ is used in an array to access each element.

Both Index and Subscript

Which of the following is NOT a valid DBMS?

C++

What does a modification attack do?

Changes software and information

Which of the following converts source code into a computer language and results in an executable file?

Compiler

What numeric value in hexadecimal is equivalent to the binary number 1101111010101101?

DEAD

Which Internet protocol is used to assign IP addresses automatically?

DHCP

The document responsible for describing the type of data stored in the database is called the:

Data dictionary

Which tool is used to reorganize clusters so as to minimize drive head movement?

Disk Defragmenter utility

What is the set of possible values for a column?

Domain

Which is NOT an advantage of using NTFS?

Efficient disk use on small volumes

First normal form says:

Eliminate repeated fields

Second normal form says:

Every column that's not part of the primary key is fully dependent on the primary key

Computer security affects:

Everyone

DSL is a combination of what two types of multiplexing?

FDM and TDM

@JT%name is a valid Java and C++ variable identifier.

False

A hub has a single input and a single output.

False

A single array can contain information of different data types (integers, characters, decimals, etc.)

False

A table is divided into databases.

False

Arrays are a good data structure to use with dynamic data.

False

By default, data returned by the SQL SELECT statement is in descending order.

False

End users need to be told what they want and how the program should work.

False

If end users or testers find a bug in the application, you should find out why they insist on breaking the program and get them some training so that they will stop making it crash.

False

In hardware, the next step up from the transistor was the transmitter.

False

Pseudocode should be written after the source code to ensure that the program was written correctly.

False

Scope creep is good for a project because it's one of the software development life cycles.

False

Sectors are made up of clusters.

False

The best way to write a good program is to have an initial meeting with the end user to find out the requirements for the project, go back to your office and write the program, and then deliver the finished product for installation.

False

The postincrement operator increments the variable and then processes the remainder of the statement.

False

The statement char[] aAnswers = new char[5] declares an array that has memory locations of 1 through 5.

False

The term "hacker" originally had a negative connotation.

False

The tester's role is not as critical as the other team roles and should be the first role eliminated if the project is behind the scheduled completion date.

False

Which type of guided medium is the least susceptible to attenuation and inductance?

Fiber-optic cable

FIFO is an acronym for:

First in, first out

Which of the following circuit types is used to create SRAM?

Flip-flop

Which Java/C++ data type do you use for the value 14.5?

Float

A __________________ is used as a visual model for describing a program's logical steps.

Flowchart

Fiber-optic cable is made of:

Glass

Which of the following is an example of an HTML tag?

HTML

Which of the following is not an Internet-related protocol?

HTML

Which of the following protocols makes the Web possible?

HTTP

_______________ technology allows the user to feel some kind of response, or feedback, from the system.

Haptic

Which is a better signal-to-noise ratio?

High

What technology do many gaze systems use to track eye movement?

Infared

Which of the following translates a program's statements, one by one, into a language the computer can understand?

Interpreter

Which type of I/O processing is most efficient?

Interrupt

LIFO is an acronym for:

Last in, First out

Third normal form says:

No nonkey columns depend on another nonkey column

Which of the following SQL SELECT options is used to organize the data being returned?

ORDER BY

Which of the OSI layers is involved with a network's electrical specifications?

Physical

What uniquely identifies a row in a table?

Primary Key

A _________________ is a standard of typical example of how something might work, but without all the built-in functionality.

Prototype

Which type of memory can't be written to easily?

ROM

Which of the following memory types is the fastest?

SRAM

What are the three levels of human memory storage?

Sensory, Short-term and long-term memory.

When a user believes that certain steps must be taken, it is called:

Superstitious Behavior

Which portion of the TCP/IP protocol suite provides error detection and correction?

TCP

What is the likely motivation of an undirected hacker?

Technical Challenge

IBM has some of its origins in what 1890 event?

The U.S. Census

What important concept is attributed to John Von Neumann?

The stored program concept

What features of transistors made them superior for computers, compared with vacuum tubes?

They were cheaper, smaller, and cooler than tubes and lasted longer

The purpose of HTTP is to:

Transfer web pages

Which of the OSI layers is responsible for the guaranteed delivery of data?

Transport

A Queue uses a FIFO structure.

True

A stack uses LIFO structure.

True

In FAT, files don't need to be stored in a contiguous block of memory.

True

Java and C++ are case-sensitive languages.

True

Modems convert binary digits into sounds by modulating tones.

True

Routers are critical to the operation of the Internet.

True

The only language computers can truly understand consists of 1s and 0s.

True

The preincrement operator increments the variable and then processes the remainder of the statement.

True

The process of a voice recognition system being able to recognize normal conversation is called Natural-Language Processing.

True

What is the name used to identify a specific location and value in memory?

Variable

Most computers today are based on:

Von Neumann architecture

Which of the following is an example of a URL?

www.cengage.com


Ensembles d'études connexes

Criminal Courts & Procedures Chapter 7

View Set

HESI: Seizure Disorder and Rationale

View Set

Navar: Art 101 Ohlone College Midterm (Only sections 1, 2, 3 and 4)

View Set

Environmental Health Quiz 5 (Ch. 5)

View Set

NU144- Chapter 46: Management of Patients With Gastric and Duodenal Disorders

View Set