CS 1030 Weber State Final
Which of the following is not one of the bus signal groups?
Fetch
Which of the following is not one of the OSI model layers?
Wireless
Inputs of 1 and 0 to an XOR gate produce what output?
1
What is the binary equivalent of the decimal number 543?
1000011111
What is the final result of the expression 5 + 2 * 4 - 2?
11
What numeric value in base 10 does the binary number 10000001 represent?
129
What base 10 value is equivalent to 3C0D16?
15,373
What is the positional value of the A in the hexadecimal number BEAD?
16
What is the final result of the expression 5 % 4 + 3 -2?
2
What is the positional value of the 1 in the binary number 100000?
32
What base 16 value is equivalent to the decimal number 1234?
4D2
What is the largest NUMBER OF ITEMS that can be represented with four hexadecimal digits?
65,536
What is the minimum number of bits required to represent 256 colors?
8
Which of the following standards is used in wireless networking?
802.11
Which HTML tag is used to provide links to other pages?
A
What does the subscript 16 indicate in the number C4A6 16?
A base 16 number
A design document is used to:
A blueprint that shows an application's functionality
Which is NOT a step of the database design process?
Add the data
In a computer, what function does a decoder usually perform?
Addressing memory
Which is NOT a type of control structure?
Algorithm
Name the four important elements of Babbage's Engine that are components of today's computer.
An input device, memory, a central processing unit, an output device
What is the likely motivation for a directed hacker?
Anger, greed, politics
A(n) __________________ is a data structure consisting of contiguous memory locations.
Array
UML was designed to:
Assist developers in creating visual models of the application's functionality
The ____________________ contains instructions and data that provide the startup program for a computer.
BIOS
A ______________________ in computer terminology is a set of wires and protocols designed to facilitate data transfer.
BUS
A(n) _______________ is used in an array to access each element.
Both Index and Subscript
Which of the following is NOT a valid DBMS?
C++
What does a modification attack do?
Changes software and information
Which of the following converts source code into a computer language and results in an executable file?
Compiler
What numeric value in hexadecimal is equivalent to the binary number 1101111010101101?
DEAD
Which Internet protocol is used to assign IP addresses automatically?
DHCP
The document responsible for describing the type of data stored in the database is called the:
Data dictionary
Which tool is used to reorganize clusters so as to minimize drive head movement?
Disk Defragmenter utility
What is the set of possible values for a column?
Domain
Which is NOT an advantage of using NTFS?
Efficient disk use on small volumes
First normal form says:
Eliminate repeated fields
Second normal form says:
Every column that's not part of the primary key is fully dependent on the primary key
Computer security affects:
Everyone
DSL is a combination of what two types of multiplexing?
FDM and TDM
@JT%name is a valid Java and C++ variable identifier.
False
A hub has a single input and a single output.
False
A single array can contain information of different data types (integers, characters, decimals, etc.)
False
A table is divided into databases.
False
Arrays are a good data structure to use with dynamic data.
False
By default, data returned by the SQL SELECT statement is in descending order.
False
End users need to be told what they want and how the program should work.
False
If end users or testers find a bug in the application, you should find out why they insist on breaking the program and get them some training so that they will stop making it crash.
False
In hardware, the next step up from the transistor was the transmitter.
False
Pseudocode should be written after the source code to ensure that the program was written correctly.
False
Scope creep is good for a project because it's one of the software development life cycles.
False
Sectors are made up of clusters.
False
The best way to write a good program is to have an initial meeting with the end user to find out the requirements for the project, go back to your office and write the program, and then deliver the finished product for installation.
False
The postincrement operator increments the variable and then processes the remainder of the statement.
False
The statement char[] aAnswers = new char[5] declares an array that has memory locations of 1 through 5.
False
The term "hacker" originally had a negative connotation.
False
The tester's role is not as critical as the other team roles and should be the first role eliminated if the project is behind the scheduled completion date.
False
Which type of guided medium is the least susceptible to attenuation and inductance?
Fiber-optic cable
FIFO is an acronym for:
First in, first out
Which of the following circuit types is used to create SRAM?
Flip-flop
Which Java/C++ data type do you use for the value 14.5?
Float
A __________________ is used as a visual model for describing a program's logical steps.
Flowchart
Fiber-optic cable is made of:
Glass
Which of the following is an example of an HTML tag?
HTML
Which of the following is not an Internet-related protocol?
HTML
Which of the following protocols makes the Web possible?
HTTP
_______________ technology allows the user to feel some kind of response, or feedback, from the system.
Haptic
Which is a better signal-to-noise ratio?
High
What technology do many gaze systems use to track eye movement?
Infared
Which of the following translates a program's statements, one by one, into a language the computer can understand?
Interpreter
Which type of I/O processing is most efficient?
Interrupt
LIFO is an acronym for:
Last in, First out
Third normal form says:
No nonkey columns depend on another nonkey column
Which of the following SQL SELECT options is used to organize the data being returned?
ORDER BY
Which of the OSI layers is involved with a network's electrical specifications?
Physical
What uniquely identifies a row in a table?
Primary Key
A _________________ is a standard of typical example of how something might work, but without all the built-in functionality.
Prototype
Which type of memory can't be written to easily?
ROM
Which of the following memory types is the fastest?
SRAM
What are the three levels of human memory storage?
Sensory, Short-term and long-term memory.
When a user believes that certain steps must be taken, it is called:
Superstitious Behavior
Which portion of the TCP/IP protocol suite provides error detection and correction?
TCP
What is the likely motivation of an undirected hacker?
Technical Challenge
IBM has some of its origins in what 1890 event?
The U.S. Census
What important concept is attributed to John Von Neumann?
The stored program concept
What features of transistors made them superior for computers, compared with vacuum tubes?
They were cheaper, smaller, and cooler than tubes and lasted longer
The purpose of HTTP is to:
Transfer web pages
Which of the OSI layers is responsible for the guaranteed delivery of data?
Transport
A Queue uses a FIFO structure.
True
A stack uses LIFO structure.
True
In FAT, files don't need to be stored in a contiguous block of memory.
True
Java and C++ are case-sensitive languages.
True
Modems convert binary digits into sounds by modulating tones.
True
Routers are critical to the operation of the Internet.
True
The only language computers can truly understand consists of 1s and 0s.
True
The preincrement operator increments the variable and then processes the remainder of the statement.
True
The process of a voice recognition system being able to recognize normal conversation is called Natural-Language Processing.
True
What is the name used to identify a specific location and value in memory?
Variable
Most computers today are based on:
Von Neumann architecture
Which of the following is an example of a URL?
www.cengage.com