CSIS 110
FALSE
The Network layer of the Internet, IP, is inherently an extremely reliable communication channel.
24
The True Color scheme uses ____ bits.
TRUE
The Von Neumann bottleneck is the inability of the sequential one-instruction-at-a-time Von Neumann model computer to handle today's large-scale problems.
loudness
The amplitude of a sound wave is a measure of its ________.
5 to 10
A cache is typically ____ times faster than RAM but possesses less storage capacity.
Virtualization
____ is the term for the separation of a service from the entity (or entities) providing that service.
Authentication
____ verifies who has the right to gain access to the computer, whether it is your local machine or the web server.
Caesar
A ____ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.
gateway
A ____ makes internetwork connections and provides routing between different WANs.
naked
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.
source
A program written in assembly language is called the ____ program.
sequential
A purely ____ algorithm is sometimes termed a straight-line algorithm.
FALSE
A strictly black-and-white image has greater storage requirements than an image represented using a gray scale.
I/O Controller
A(n) ____ handles the details of input/output and compensates for any speed differences between I/O devices and other parts of the computer.
pseudo-op
A(n) ____ invokes a service of the assembler.
computer network
A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.
256
ASCII is able to encode a total of ____ different symbols
256
ASCII is able to encode a total of ____ different symbols.
TRUE
All modern operating systems provide GUIs.
unambiguous
An operation that is ____ is called a primitive operation of the computing agent carrying out the algorithm.
more
Any whole number that can be represented in base 10 can also be represented in base 2, although it may take ____ digits.
TRUE
As computers become faster, memory access speeds are not keeping pace.
internet forums
Bulletin board systems evolved into modern-day _______.
binary values
John Von Neumann's stored program computer lay the groundwork for modern-day computing by allowing the computer to store instructions in ____ alongside the data.
high-level programming
C++ and Java are examples of ____ languages.
FALSE
Clients cannot perform local computations without access to the network.
MIMD
Cluster computing is an example of _________ parallel computing.
TRUE
The variable used to determine the address of a given instruction or piece of data is called the location counter. _________________________
FALSE
Examples of volatile memory are mass storage devices such as disks and tapes. _________________________
TRUE
Groupware is software that facilitates the efforts of individuals connected by a network and working on a single, shared project.
2
How many digits are there in the binary number system?
point-and-click
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.
logarithms
In 1614, John Napier invented ____ as a way to simplify difficult mathematical computations.
high-level programming; machine language
In ____, a single instruction provides multiple instructions in _______.
nondestructive fetch
In a ____, the original contents of the memory cell are unchanged.
end of each pass
In a posttest loop, the continuation condition is tested at the ____ through the loop.
TRUE
In a two-level memory hierarchy, when the computer needs a piece of information, it looks in cache memory first, then RAM.
label
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.
computing agent
In computer science terminology, the machine, robot, person, or thing carrying out the steps of the algorithm is called a(n) ____.
Ethernet
In the commercial and office environment, the most widely used broadband technology is ____.
switched
In the early days of networking, the most common way to transmit data was via ____, dial-up telephone lines.
variable
In the line of pseudocode, "Set the value of Area to length × width", "Area" is a ____.
TRUE
Information is stored in the memory of a computer using the binary numbering system.
control unit
It is the task of the ____ to fetch and execute instructions.
external representation
The way information is entered at a keyboard and displayed on a screen is known as the ____ of information.
FALSE
MIMD parallelism is not a scalable architecture. _________________________
Wi-Fi
One of the most widely used standards for wireless local access is called ____.
TRUE
One of the services provided by pseudo-ops is program construction.
FALSE
The binary-to-decimal algorithm is based on successive divisions by 2. _________________________
sequential
The branch machine language instructions alter the normal _______ flow of control.
TRUE
The branch of computer science that studies computers in terms of their major functional units and how they work is known as computer organization.
op code table
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.
FALSE
The emitter and collector are the two input lines of a transistor.
authorization
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.
1622
The first slide rule appeared around ____.
TRUE
The instructions that can be decoded and executed by the control unit of a computer are represented in machine language.
gigabyte
There are 2 30 bytes in a _______.
TRUE
The principle of locality states that when the computer uses something, it will probably use it again very soon.
electronic commerce
____ is a general term applied to any use of computers and networking to support the paperless exchange of goods, information, and services in the commercial sector.
English
____ is an example of a natural language.
TRUE
The term switched, dial-up means that when you dial a telephone number, a temporary circuit is established between the caller and the call recipient.
cycles
The total number of ____ per second is called hertz.
counter
To create a loop that executes exactly b times, we create a ____.
Social networks
____ are systems that create communities of users who share common interests and activities and which provide multiple methods of online interaction.
bit
What is a single binary digit called?
16
What is the decimal value of the largest digit in the hexadecimal number system?
8
What is the largest digit in the octal number system?
binary
What is the lowest base in which the number 10 could be a valid number?
decimal
What is the lowest base in which the number 987 could be a valid number?
a. It does not halt in a finite amount of time.
What is wrong with the following algorithm? 1. Set X to be 1 2. Increment X 3. Print X 4. If X > 0, repeat from 2 a. It does not halt in a finite amount of time. b. It is not well ordered. c. It does not produce a result. d. It is ambiguous.
b. polynomial
Which of the following can be used to express the value of every number in any number system? a. quotient b. polynomial c. rational number d. radix
a. number
Which of the following is a unit in an abstract mathematical system subject to the laws of arithmetic? a. number b. natural number c. integer d. negative number e. rational number
e. rational number
Which of the following is an integer or the quotient of two integers (excluding division by zero)? a. number b. natural number c. integer d. negative number e. rational number
d. word
Which unit of binary storage has a size that is processor-dependent? a. byte b. nibble c. bit d. word e. block
Cloud computing
____ behaves much like the client/server model, except that the servers no longer need to be local to the client population.
Authorization
____ governs what an authenticated user is allowed to do.
Hypertext
____ is a collection of documents interconnected by pointers.
register
A(n) ____ is a storage cell that holds the operands of an arithmetic operation and that, when the operation is complete, holds its result.
conditional
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
dual authentication
Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as _______
TRUE
The World Wide Web was completed and made available to all researchers at CERN in August 1991, the date that marks the birth of the web.
input/output units
The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.
interface
The ____ hides from the user the messy details of the underlying hardware.
program counter
The ____ holds the address of the next instruction to be executed.
bit depth
The ____ is the number of bits used to encode each sample.
latency
The ____ of a disk is the time for the beginning of the desired sector to rotate under the read/write head.
seek time
The ____ of a disk is the time needed to position the read/write head over the correct track.
NOT
The ____ operation complements the value of a Boolean expression.
compare
The ____ operation in Von Neumann machines uses a special set of bits known as condition codes.
algorithmic
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.
analog
The voice-oriented dial-up telephone network was originally a(n) ____ medium.
two
To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
functional units
To understand how computers process information, we must study computers as collections of ____ that perform tasks such as instruction processing, information storage, computation, and data transfer.
semiconductors
Transistors are constructed from ____, such as silicon and gallium arsenide.
high-level languages
Translators for ____ are called compilers.
Resource sharing
____ is the ability to share physical resources, such as a printer or storage device, as well as logical resources, such as software and information.
digital subscriber line
A ____ uses the same wires that carry regular telephone signals into your home.
execution
During the ____ phase, the control unit circuitry generates the necessary sequence of control signals and data transfer signals to the other units of the computer to carry out the instruction.