Object Oriented Programming Exam 1
An uninitialized variable contains a ____—the value last stored in the memory location reserved for that variable
"garbage" value (also called an undefined value)
Counter-controlled repetition requires
-the name of a control variable (or loop counter) -the initial value of the control variable -the loop-continuation condition that tests for the final value of the control variable (i.e., whether looping should continue) -the increment (or decrement) by which the control variable is modified each time through the loop.
A function prototype (also called a function declaration) tells the compiler
-the name of a function -the type of data returned by the function -the number of parameters the function expects to receive -the types of those parameters and -the order in which the parameters of those types are expected.
Stream insertion operator
<<
Input unit/Input device
A device that accepts data to be stored in memory
Open-source software
A software development style that departs from the proprietary development that dominated software's early years.
Packet switching
A technique in which digital data was sent in small bundles called packets.
ARPA proceeded to implement the _____, which eventually evolved into today's _____.
ARPANET; Internet
runtime errors (execution-time errors)
An error that occurs during the execution of a program. (divided by 0)
_____ were developed to convert early assembly-language programs to machine language.
Assemblers
The ____ are free, open-source libraries created by members of the C++ community.
Boost C++ Libraries
Central processing unit (CPU)
Brain of the computer that performs instructions defined by software
Most C++ programmers take advantage of the rich collections of classes and functions in the
C++ Standard Library.
can be used to force the averaging calculation to produce a floating-point numeric result
Cast operator
Arithmetic and logic unit
Designed to perform mathematical operations
a symbolic integer constant defined in the <iostream> header file
EOF
Android
Fastest growing mobile and smartphone operating system; open source and free
In 1989, Tim Berners-Lee of CERN (the European Organization for Nuclear Research) began to develop a technology for sharing information via hyperlinked text documents—called the
HyperText Markup Language (HTML).
ARPA accomplished this with the development of_______, truly creating a network of networks, the current architecture of the Internet.
IP—the Internet Protocol
Comma-separated list
If more than one name is declared in a declaration, the names are separated by commas
______ is crucial to good software engineering.
Information hiding
define and standardize the ways in which things such as people and systems interact with one another
Interfaces
_______ were developed to execute high-level language programs directly (without the need for compilation), although more slowly than compiled programs.
Interpreter programs
the last item pushed (inserted) is the first item popped (removed)
Last-in, first-out (LIFO) data structures
enables you to use one syntax to initialize a variable of any type
List initialization (also called uniform initialization)
Bytes
Made up of 8 bits; represents a single character
appear between a constructor's parameter list and the left brace that begins the constructor's body
Member initializers
_______ allows you to implement an object-oriented design as a working system.
Object-oriented programming (OOP)
argument in parentheses
Parameterized stream manipulator
Ada
Pascal based language
By convention, the name of a user-defined class begins with a capital letter, and for readability, each subsequent word in the class name begins with a capital letter. Often referred to as
Pascal case
is an artificial and informal language that helps you develop algorithms
Pseudocode (or "fake" code)
______ such as the popular web languages JavaScript and PHP are processed by interpreters.
Scripting languages
Operating Systems
Software systems that make using computers more convenient for users, application developers and system administrators.
specifies that the value of each bool expression should be displayed as either the word "true" or the word "false."
Stream manipulator boolalpha (a sticky manipulator)
The combined set of protocols is now commonly called
TCP/IP
The protocol (i.e., set of rules) for communicating over the ARPANET became known as
TCP—the Transmission Control Protocol
_____ is now the most widely used graphical scheme for modeling object-oriented systems.
The Unified Modeling Language (UML)
Microsoft developed the ______, consisting of a graphical user interface built on top of DOS
Windows operating system
escape character
\
escape sequence for newline
\n
A function prototype does not have to: a. Include parameter names. b. Terminate with a semicolon. c. Agree with the function definition. d. Match with all calls to the function.
a
An activation record will be popped off the function call stack whenever: a. A function returns control to its caller. b. A function calls another function. c. A function calls itself. d. A function declares a local variable.
a
An uninitialized local variable contains: a. The value last stored in the memory location reserved for that variable. b. No value. c. A value of zero. d. A randomly assigned value.
a
Assuming that the string object text contains the string "Hello!!! ", the "expression text.substr( 2 , 5 ) would return a string object containing the string: a. "llo!! ". b. "llo! ". c. "ello! ". d. "ello".
a
Consider the following code, assuming that x is an int with an initial value of 12 if( x = 6 ) cout << x; What is the output? a. 6 b. 12 c. Nothing. d. A syntax error is produced.
a
In the UML, the top compartment of the rectangle modeling a class contains: a. The class's name. b. The class's attributes. c. The class's behaviors. d. All of the above.
a
Labels are the only identifiers with: a. Function scope. b. File scope. c. Block scope.
a
Overloaded functions must have: a. Different parameter lists. b. Different return types. c. The same number of parameters. d. The same number of default arguments.
a
Pseudocode normally does not include: a. Declarations. b. Input/output. c. Algorithms. d. Control structures.
a
The conditional operator (?:): a. Is the only ternary operator in C++. b. Is a unary operator. c. Associates from left to right. d. Accepts two operands.
a
The rand function generates a data value of the type: a. unsigned int. b. int. c. long int. d. short int.
a
The unary scope resolution operator is used: a. To access a global variable when a local variable of the same name is in scope. b. To access any variable in an outer block when a local variable of the same name is in scope. c. To access a global variable when it is out of scope. d. To access a local variable with the same name as a global variable.
a
Variables are also known as: a. lvalues, but can be used as rvalues. b. lvalues, and cannot be used as rvalues. c. rvalues, and cannot be used as lvalues. d. Constant variables.
a
Which of the following expressions returns the trigonometric sine of x? a. sin( x ). b. sine( x ). c. trig_sin( x ). d. trig_sine( x ).
a
Which of the following is not true of static local variables? a. They are accessible outside of the function in which they are defined. b. They retain their values when the function in which they are defined terminates. c. They are initialized to zero if not explicitly initialized by the programmer. d. They can be of type int.
a
Hypertext Transfer Protocol (HTTP)
a communications protocol used to send information over the web.
A variable is
a location in the computer's memory where a value can be stored for use by a program.
A preprocessing directive is
a message to the C++ preprocessor.
Web 2.0
a new generation of internet services that emphasize online collaboration and sharing
A nonfatal logic error allows
a program to continue executing, but usually produces incorrect results
A fatal logic error causes
a program to fail and terminate prematurely
each class is modeled in a UML class diagram as
a rectangle with three compartments.
special value used to indicate "end of data entry" called
a sentinel value (also called a signal value, a dummy value or a flag value)
contains the return address that the called function needs in order to return to the calling function
a stack frame or an activation record
A keyword is
a word in code that is reserved by C++ for a specific use.
The ___ may be repeated, but this is unnecessary and can be confusing.
access specifiers public and private
get functions are also sometimes called
accessors
procedure for solving a problem in terms of the actions to execute and the order in which the actions execute
algorithm
Nonfatal runtime errors
allow programs to run to completion, often producing incorrect results
World Wide Web
allows you to locate and view multimedia-based documents on almost any subject over the Internet.
Cloud computing
allows you to use software, hardware and information stored in the "cloud"
LAMP
an acronym for the set of open-source technologies that many developers use to build web applications; stands for Linux, Apache, MySQL, and PHP
Database
an electronic collection of data that's organized for easy access and manipulation
Moore's Law is
an observation made by Intel co-founder Gordon Moore in 1965. He noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention.
Using a loop's counter control variable in a calculation after the loop often causes a common logic error called
an off-by-one error
Platform as a Service (PaaS)
another capability of cloud computing
Web 2.0 embraces an ______—a design that encourages user interaction and community contributions.
architecture of participation
An important feature of function prototypes is
argument coercion
A function call supplies values—called ____—for each of the function's parameters.
arguments
English-like abbreviations to represent elementary operations. These abbreviations formed the basis of ______.
assembly languages
An identifier's storage class: a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations. b. Determines the period during which that identifier exists in memory. c. Determines where the identifier can be referenced in a program. d. All of the above.
b
The inline keyword: a. Increases function-call overhead. b. Can reduce a function's execution time but increase program size. c. Can decrease program size but increase the function's execution time. d. Should be used with all frequently used functions.
b
Which of the following does not display correct if answer is equal to 7 and incorrect if answer is not equal to 7? a. if ( answer == 7 ) cout << "correct"; else cout << "incorrect"; b. cout << answer == 7 ? "correct" : "incorrect"; c. cout << ( answer == 7 ? "correct" : "incorrect" ); d. answer == 7 ? cout << "correct" : cout << "incorrect";
b
Which of the following is not one the rules for forming structured programs? a. Begin with the "simplest activity diagram." b. Any transition arrow can be reversed. c. Any action state can be replaced by two action states in sequence. d. Any action state can be replaced by any control statement.
b
Which of the following is true? a. Assigning a double value to an int does not lose any data. b. For fundamental-type variables, list-initialization syntax prevents narrowing conversions that could result in data loss. c. For fundamental-type variables, list-initialization syntax allows narrowing conversions that could result in data loss. d. None of the above.
b
Which of the following is true? a. You can initialize data members of a class only in the class's constructor. b. C++11 allows you to provide a default value for a data member when you declare it in the class declaration. c. You cannot initialize data members of a class. d. None of the above
b
Which of the following statements is false? a. The concepts of icons, menus and windows were originally developed by Xerox PARC. b. Windows is an open source operating system. c. The software that contains the core components of the operating system is called the kernel. d. Linux source code is available to the public for examination and modification.
b
The = operator and the + operator are called ____ because each has two operands.
binary operators
Identifiers declared inside a block have ___, which begins at the identifier's declaration and ends at the terminating right brace (}) of the block in which the identifier is declared.
block scope
All of the following are true of functions except: a. They define specific tasks that can be used at many points in a program. b. A function call must specify the name and arguments of the function. c. The definition of a function usually is visible to other functions. d. The implementation of a function is hidden from the caller.
c
Assuming that GradeBook.h is found in the current directory and the iostream header file is found in the C++ Standard Library header file directory, which of the following preprocessor directives will fail to find its desired header file? a. #include <iostream> b. #include "iostream" c. #include <GradeBook.h> d. #include "GradeBook.h"
c
Converting from type ________ to type ________ will result in the loss of data. a. bool, char. b. float, double. c. int, char. d. short, long.
c
Enumeration constants: a. Must have unique integer values. b. Can be assigned other values once they've been defined. c. Must have unique identifiers. d. Are declared using the keyword const.
c
Recursion is to the base case as iteration is to what: a. The counter. b. A repetition structure. c. Failure of the loop continuation test. d. A selection structure.
c
Specifying the order in which statements are to be executed in a computer program is called: a. An algorithm. b. Transfer of control. c. Program control. d. Pseudocode.
c
When a client code programmer uses a class whose implementation is in a separate file from its interface, that implementation code is merged with the client's code during the: a. Programming phase. b. Compiling phase. c. Linking phase. d. Executing phase.
c
Which of the following does the C++ compiler not examine in order to select the proper overloaded function to call? a. Types and order of the arguments in the function call. b. The number of arguments in the function call. c. The return type of the function. d. It examines all of the above.
c
Which of the following is false? a. An engine implements a random-number generation algorithm that produce pseudorandom numbers. b. A distribution controls the range of values produced by an engine, the types of those and the statistical properties of the values. c. The default range of a uniform_int_distribution is from 0 to 32767. d. C++11 provides many classes that represent various random-number generation engines and distributions.
c
_____ capitalization style allows the first letter to be either lowercase or uppercase
camel case
C++ is ___ sensitive
case
Fatal runtime errors
cause programs to terminate immediately without having successfully performed their jobs
standard error system
cerr
Software reuse
changing of existing software to tailor to a programmer's needs
Digits, letters, and special symbols are known as
characters
The Unicode character set contains
characters for many of the world's languages
standard input stream
cin
In C++, we create a program unit called a ____ to house the set of member functions that perform the class's tasks.
class
C++ programs consist of pieces called _____ and _____
classes; functions
any class or function that calls the object's member functions from outside the object
client of an object
Access specifiers are always followed by a
colon
An attempt by a function, which is not a member of a particular class to access a private member of that class is a
compilation error
Forgetting to include the appropriate header when using standard library functions is a
compilation error
A syntax error occurs when the
compiler encounters code that violates C++ language rules
Syntax errors are also called
compiler errors, compiletime errors, or compilation errors
Translator programs called _______ convert high-level language programs into machine language.
compilers
Fields
composed of characters or bytes
by enclosing the body statements in a pair of braces, { }, creating what's called a
compound statement or a block
Computers process data under the control of sequences of instructions called
computer programs
Using multiple stream insertion operators (<<) in a single statement is referred to as
concatenating, chaining or cascading stream insertion operations
a state in which the object's data member contains a valid value
consistent state
Each class can provide one or more _____ that can be used to initialize an object of the class when the object is created
constructors
Only one other way to connect control statements—called
control-statement nesting
Control statements are attached to one another by connecting the exit point of one to the entry point of the next Called
control-statement stacking
standard output stream
cout
A variable that can have values only in the range 0 to 65535 is a: a. Four-byte int. b. Four-byte unsigned int. c. Two-byte int. d. Two-byte unsigned int.
d
All of the following are reasons to use recursion except: a. An iterative solution is not apparent. b. The resulting program is easier to debug. c. It more naturally mirrors the problem. d. It maximizes execution performance.
d
An example of a unary operator is: a. The < relational operator. b. The = assignment operator. c. The % arithmetic operator. d. The ! logical operator.
d
Consider the execution of the following for loop for (int x = 1; x < 5; increment ) cout << x + 1 << endl; If the last value printed is 5, which of the following might have been used for increment? a. x++ b. x += 1 c. ++x d. Any of the above.
d
In regards to default arguments, which of the following is false? a. When an argument is omitted in a function call, the default value of that argument is automatically inserted by the compiler and passed in the function call. b. They must be the rightmost (trailing) arguments in a function's parameter list. c. Default values can be constants. d. Default values cannot be global variables or function calls.
d
Of the following, which is not a logic error? a. Not placing curly braces around the body of an if that contains two statements. b. Using == to assign a value to a variable. c. Failing to initialize counter and total variables before the body of a loop. d. Using commas instead of the two required semicolons in a for header.
d
The expression if ( num != 65 ) cannot be replaced by: a. if ( num > 65 || num < 65 ) b. if ( !( num == 65 ) ) c. if ( num - 65 ) d. if ( !( num - 65 ) )
d
Which of the following C++ Standard Library headers does not contain a C++ Standard Library container class? a. <vector>. b. <list>. c. <stack>. d. <string>.
d
Which of the following data types can be used to represent integers? a. char b. long c. short d. All of the above.
d
Which of the following is false? a. The effects of break and continue statements can be achieved by structured programming techniques. b. break and continue statements can make a program perform faster than with the corresponding structured techniques. c. Many programmers feel that break and continue violate structured programming. d. You should always try to write the fastest, smallest code possible before attempting to make it simple and correct.
d
Which of the following is false? a. break and continue statements alter the flow of control. b. continue statements skip the remaining statements in current iteration of the body of the loop in which they are embedded. c. break statements exit from the loop in which they are embedded. d. continue and break statements may be embedded only within repetition statements.
d
Which of the following is not included in a function's activation record? a. The return address of its caller function. b. Parameter values received from its caller. c. Local variables it has declared. d. The name of the function.
d
Which of the following statements is false? a. Object-oriented programming is today's key programming methodology. b. C++ is one of today's most popular software development languages. c. Software commands computer hardware to perform tasks. d. In use today are more than a trillion general-purpose computers and trillions more cellphones, smartphones and other handheld devices.
d
Which statement is false? a. Classes are reusable software components. b. A class is to an object as a blueprint is to a house. c. Performing a task in a program requires a method. d. A class is an instance of its object.
d
Declaring data members with access specifier private is known as
data hiding
Data items processed by computers form a __________ that becomes larger and more complex in structure as we progress from bits to characters to fields, and so on.
data hierarchy
declared inside a class definition but outside the bodies of the class's member-function definitions
data members
The benefits of data integrity are not automatic simply because
data members are made private
Attributes are specified by the class's
data members.
Any constructor that takes no arguments is called a
default constructor
If a class does not explicitly include constructors, the compiler provides a ______ with no parameters
default constructor
it's more precise to call a declaration that also reserves memory a
definition
Pascal
designed for teaching structured programming and was popular in college courses for several decades
When a value is placed in a memory location, the value overwrites the previous value in that location; thus, placing a new value into a memory location is said to be
destructive
Fortran
developed by IBM Corporations to be used for scientific and engineering applications that require complex mathematical computations
COBOL
developed by computer manufacturers, the U.S. government and industrial computer users based on a language developed by Grace Hopper
Basic
developed in 1960s in Dartmouth college to familiarize novices with programming techniques
Prompt
directs the user to take a specific action
Experience has shown that the best way to develop and maintain a large program is to construct it from small, simple pieces, or components. This technique is called
divide and conquer
The if...else statement is called a ___ because it selects between two different actions
double-selection statement
To help you prepare for the larger programs you'll encounter later in this book and in industry, we often use a separate source-code file containing function main to test our classes (this is called a ______).
driver program
C++ programs typically go through six phases:
edit, preprocess, compile, link, load and execute
White space
empty spaces in a design
Classes _______attributes and member functions into objects—an object's attributes and member functions are intimately related.
encapsulate (i.e., wrap)
An ____, introduced by the keyword enum and followed by a type name, is a set of integer constants represented by identifiers.
enumeration
Logic errors
errors that cause programs to execute incorrectly.
A linker links the object code with the code for the missing functions to produce an
executable program
the computer, under the control of its CPU, _____ the program one instruction at a time.
executes
Dividing by zero results in a
fatal runtime error
Release candidates
feature complete and bug free and ready for use by the community
(UML)The solid circle surrounded by a hollow circle that appears at the bottom of the activity diagram represents the
final state
Variables of type ___ represent single-precision floating-point numbers and have seven significant digits on most of today's systems.
float
One of the most important mechanisms for computer science students to understand is the
function call stack (or program execution stack).
function call stack (or program execution stack) supports the
function call/return mechanism.
The first line of a function definition is commonly called the
function header
several functions of the same name to be defined, as long as they have different signatures
function overloading
a declaration of a function that tells the compiler the function's name, its return type and the types of its parameters
function prototype
Labels (identifiers followed by a colon such as start: or a case label in a switch statement) are the only identifiers with
function scope
The portion of a function prototype that includes the name of the function and the types of its arguments is called the
function signature or simply the signature
The only identifiers with ___ are those used in the parameter list of a function prototype.
function-prototype scope
Library function ____ reads a line of text into a string.
getline
Sometimes functions are not members of a class. Called
global functions
An identifier declared outside any function or class has
global namespace scope
Record
group of related fields
File
group of related records
A computer consists of various devices referred to as
hardware
Output unit/Output device
hardware that gives the user feedback
.h filename extension—known as a
header
Smart pointers
help you avoid errors associated with traditional pointers.
Ajax
helps Internet-based applications perform like desktop applications
A variable name is any valid ____ that is not a keyword
identifier
The _____ allows a program to take alternative action based on whether a condition is true or false.
if statement
Multi-core processor
implements multiple processors on a single integrated-circuit chip
Sentinel-controlled repetition is often called
indefinite repetition
A new class of objects can be created quickly and conveniently by ______—the new class absorbs the characteristics of an existing class, possibly customizing them and adding unique characteristics of its own.
inheritance
#include <iostream> notifies the preprocessor to include in the program the contents of the
input/output stream header file <iostream>.
An object is then referred to as an ______ of its class.
instance
Provide tools that support the software-development process, including editors for writing and editing programs and debuggers for locating logic errors
integrated development environments (IDEs)
The ____ describes what services a class's clients can use and how to request those services, but not how the class carries out the services
interface of a class
Memory unit/memory/primary memory
internal data storage in a computer
Declarations
introduce identifiers into programs.
Refactoring
involves reworking programs o make them clearer and easier to maintain while preserving their correctness and functionality
The software that contains the core components of the operating system is called the
kernel
Java
key goal is to be able to write programs that will run on a great variety of computer systems and computer-control devices
The UML is ____—it's used with many different programming languages
language independent
The UML represents data members as attributes by
listing the attribute name, followed by a colon and the attribute type
Variables declared in a function definition's body are known as ____ and can be used only from the line of their declaration in the function to the closing right brace (}) of the block in which they're declared
local variables
Variable names such as number1, number2 and sum actually correspond to _____ in the computer's memory.
locations
In some cases, writing != as =! will not be a syntax error, but almost certainly will be a
logic error
Placing a semicolon after the condition in an if statement leads to a
logic error
forgetting a break statement when one is needed in a switch statement is a
logic error
Confusing the equality operator == with the assignment operator = results in
logic errors
Omitting the braces that delimit a block can lead to
logic errors
Regardless of differences in physical appearance, computers can be envisioned as divided into various
logical units or sections
Variable names are said to be
lvalues
Any computer can directly understand only its own ______, defined by its hardware architecture.
machine language (also called machine code)
Performing a task in a program requires a
member function
Each message is implemented as a _______ that tells a member function of the object to perform its task.
member function call
The promotion rules apply to expressions containing values of two or more data types also referred to as
mixed-type expressions
C
most of code for general-purpose operating systems is written in C or C++
Linux
most popular open-source operating system; Popular in servers, personal computers and embedded systems
The switch selection statement is called a ___ because it selects among many different actions
multiple-selection statement
Set functions are also sometimes called
mutators
For fundamental-type variables, list-initialization syntax also prevents so-called ____ that could result in data loss.
narrowing conversions
When a value is read out of a memory location, the process is
nondestructive
a set of random numbers that can't be predicted
nondeterministic random numbers
PHP
object-oriented , "open-source" "scripting" language supported by a community of users and developers and is used by numerous websites
If this process involves analyzing and designing your system from an object-oriented point of view, it's called an
object-oriented analysis and design (OOAD) process.
Objective-C
object-oriented language based on C
Using an incorrect relational operator or using an incorrect final value of a loop counter in the ocndition of a while or for statement can cause
off-by-one errors
C#
one of Microsoft's three object-oriented primary programming languages
Perl
one of the most widely used object-oriented scripting languages for web programming
Ruby on rails
open source, object-oriented programming language with a simple syntax that's similar to Perl and Python
Additional information that a function needs to perform its task is known as a
parameter
To specify that a function requires data to perform its task, you place additional information in the function's _____, which is located in the parentheses following the function name.
parameter list
Two ways to pass arguments to functions in many programming languages are
pass-by-value and pass-by-reference
A statement instructs the computer to
perform an action.
The C++ preprocessor obeys commands called ______, which indicate that certain manipulations are to be performed on the program before compilation.
preprocessing directives
A ____ program executes automatically before the compiler's translation phase begins
preprocessor
Automatic storage is an example of the
principle of least privilege
Computer programs guide the computer through ordered actions specified by people called computer
programmers
Windows is a ______ operating system—it's controlled by Microsoft exclusively.
proprietary
Design patterns
proven architectures for constructing flexible and maintainable object-oriented software
Function rand actually generates
pseudorandom numbers
A class's public interface consists of the class's public member functions (also known as the class's ___).
public services
a function that calls itself, either directly, or indirectly (through another function)
recursive function
As in algebra, it's acceptable to place unnecessary parentheses in an expression to make the expression clearer.These are called
redundant parentheses
an alias for its corresponding argument in a function call.
reference parameter
several storage-class specifiers that determine a variable's storage duration:
register, extern, mutable and static.
Beta
released to a larger number of developers later in the development process after most major bugs have been fixed and new features are nearly complete
When you define a function, you must specify a ____ to indicate the type of the value returned by the function when it completes its task.
return type
Constants are said to be
rvalues
Agile software development
s set of methodologies that try to get software implemented faster and using fewer resources than previous methodologies
The portion of the program where an identifier can be used is known as its
scope
This restricted use of the control variable name is known as the variable's
scope
Each member-function name is preceded by the class name and ::, which is known as the
scope resolution operator
Function srand takes an unsigned integer argument and ____ the rand function to produce a different sequence of random numbers for each execution.
seeds
Choosing meaningful identifiers makes a program
self-documenting
statement terminator
semicolon (;)
EOF stands for "end-of-file". Commonly used as a
sentinel value
statements in a program execute one after the other in the order in which they're written
sequential execution
This performance feature for the evaluation of logical AND and logical OR expressions is called
short-circuit evaluation
Visual Basic
simplified the development of Microsoft windows applications
A block can be placed anywhere in a program that a
single statement can be placed
A comment beginning with // is called a _____ because it terminates at the end of the current line.
single-line comment
The if selection statement is a ___ because it selects or ignores a single action
single-selection statement
The programs that run on a computer are referred to as
software
Continuous beta
software that's developed using this approach generally does not have version numbers
.cpp file, also known as a
source-code file
URL (Uniform Resource Locator)
specifies the address (i.e., location) of the web page displayed in the browser window.
If more function calls occur than can have their activation records stored on the function call stack, an a fatal error known as ___ occurs
stack overflow
When a cout statement executes, it sends a stream of characters to the ____—which is normally "connected" to the screen.
standard output stream object—std::cout
Stream manipulators fixed and setprecision remain in effect until they're changed—such settings are called
sticky settings
Arithmetic expressions in C++ must be entered into the computer in
straight-line form
std::endl is a so-called
stream manipulator
Together, the quotation marks and the characters between them are called a
string, a character string or a string literal.
Forgetting the semicolon at the end of a class definition is a
syntax error
The keystroke combinations for entering end-of-file are
system dependent
(UML)The solid circle at the top of the diagram represents
the activity's initial- state—the beginning of the workflow before the program performs the modeled activities.
Alpha
the earliest release of a software product that's still under active development
Secondary storage unit
the long-term, high-capacity "warehousing" section
The syntax of a programming language specified
the rules for creating proper programs in that language
All programs could be written in terms of only three control structures
the sequence structure the selection structure and the repetition structure
A computer's character set is
the set of all the characters used to write programs and represent data items
Bit
the smallest unit of data in a computer; binary digit 1s and 0s
Software as a Service (SaaS)
the software runs on servers elsewhere on the internet
Hypertext Transfer Protocol Secure (HTTPS) is
the standard for transferring encrypted data on the web
Software Development Kits (SDKs)
the tools and documentation developers use to program applications
statements enable you to specify that the next statement to execute may be other than the next one in sequence
transfer of control
The compiler encodes each function identifier with the types of its parameters (sometimes referred to as name mangling or name decoration) to enable
type-safe linkage.
Fundamental types
types such as int, double, and char
access a global variable when a local variable of the same name is in scope
unary scope resolution operator (::)
Functions in the same scope must have
unique signatures
Regular expressions
used to match specific character patterns in text
Functions you write are referred to as
user-defined functions
The compiler does not automatically know what type GradeBook is—it's a
user-defined type
In industrial-strength code, always
validate all inputs
escape sequence
when another character follows a backslash
Loader
which takes the executable image from disk and transfers it to memory
An activity diagram models the ____ of a portion of a software system.
workflow (also called the activity)