After Midterm Homework Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____ is a set of instructions for the computer to follow.

A program

Assume the following variable definitions. B=10, C=20, D=30. What is the output of the following Python statement? print ("B+C-D") A) B+C-D B) 10+20-30 C) 0 D) 60 E) 10

A) B+C-B (Quotation marks)

Instruction sequences that repeat are called: A) loops B) assumptions C) tests D) sorting

A) Loops

To ensure that computers developed by different manufacturers can communicate, _________ have been developed. A) Standardized protocols B) client/server architecture C) WANs D) Application software

A) Standardized protocols

In a directory hierarchy, folder names are separated by a: A) slash (/) B) backslash (\) C) dot (.) D) space

A) slash (/)

The title that appears on the title bar of the browser is specified using: A) title tags B) pagename tags C) html tags D) body tags

A) title tags

Which of the following tags is not paired? A. <hr> B. <i> C. <p> D. <html>

A. <hr>

Which of the following would put "Kelly Clarkson —In Concert" in the title bar of a Web page? A. <title> Kelly Clarkson — In Concert</title> B. </title> Kelly Clarkson — In Concert<title> C. <title> Kelly Clarkson — In Concert<title/> D. <TITLE/> Kelly Clarkson — In Concert</TITLE>

A. <title> Kelly Clarkson — In Concert</title>

The <a...> tag is called an: A. Anchor tag B. Address tag C. Add tag D. Append tag

A. Anchor tag

The math in the computer is done by the ______.

ALU

Which of the following is an example of definiteness? A) Add and multiply values A, B, and C to obtain the result. B) Add A and B. Divide the sum by C. If C = 0, the solution is "undefined." C) Use multiplication and addition operations to solve the problem. D) All of the above

B) Add A and B. Divide the sum by C. If C = 0, the solution is "undefined."

The main technology and protocol for local area networks is A) DNS B) Ethernet C) TCP/IP D) ISP

B) Ethernet

The very last part of a URL is the: A) protocol B) file name C) domain name D) server computer's name

B) file name

When a URL ends in a folder name instead of a file name, the server usually looks for a file called: A) dir.html B) index.html C) home D) all of the above

B) index.html

The correct order from lowest to highest level of detail of the same program is: A) assembly language, programming language, and binary B) programming language, assembly language, and binary C) binary, assembly language, and programming language D) binary, programming language, and assembly language

B) programming language, assembly language, and binary

Computer experts call spaces, tabs and blanks that have been inserted for readability: A) alignment B) white space C) embedded space D) tags

B) white space

A megabyte is 1,048,576 bytes. Explain why it is not 1,000,000 bytes.

Because computers operate in with binary numbers, therefore 2^20 is used.

What does the statement mean: "Hardware is useless without software"?

By itself, hardware has no inherent capabilities. Hardware can only be made useful through the instructions that are executed on it. Those instructions are contained in software. Therefore, hardware is 'nothing' without software.

The HTML tag for bold text is: A) <bb></bb> B) <bld></bld> C) <b></b> D) <i></i>

C) <b></b>

Which of the following will display the rocket.jpg file on the page if the image is stored in the same folder as the page? A) <img "rocket.jpg"> B) <img src rocket.jpg> C) <img src= "rocket.jpg"> D) <img src "rocket.jpg">

C) <img src= "rocket.jpg">

Which of the following represents the correct order, from largest to smallest? A) LAN, WWW, Internet B) WWW, Internet, LAN C) Internet, WWW, LAN D) Internet, LAN, WWW

C) Internet, WWW, LAN

HTML commands are called: A. hops B. brackets C. tags D. tokens

C) Tags

Programmers use programming languages instead of natural languages because programming languages: A) are extremely easy to learn B) allow only a limited number of possible solutions for a specific problem C) are precise and unambiguous D) allow more details to be omitted

C) are precise and unambiguous

An algorithm is a(n) A. list of general nonspecific steps to produce an output B. logarithm C. systematic method for producing a specified result D. math problem

C) systematic method for producing a specified result

Algorithms are used by A. only computers B. only humans C. various agents D. no one, they are not real.

C) various agents

What is the potential number of IPv4 addresses available? A. 65,536 B. 16,777,216 C. 4,294,967,296 D. infinite

C. 4,294,967,296

DNS stands for: A. Determined Name of Sender B. Determined Not Spam C. Domain Name System D. Domain Number Sequence

C. Domain Name System

The <p> </p> tags indicate the beginning and end of a: A. table B. picture C. paragraph D. preformatted text section

C. paragraph

Transferring and transforming information is controlled by ______.

Controll Unit

Which of the following tags is not required on a Web page? A) </html> B) <body> C) <head> D) <hr>

D) <hr>

The tags used to specify table headings/column headings are: A) <hd> and </hd> B) <ch> and </ch> C) <cd> and </cd> D) <th> and </th>

D) <th> and </th>

Which of the following lacks finiteness? A) Bake for 50 minutes at 375 degrees. B) Read Chapter 10. C) Repeat until you get to the end of the file. D) Find pi.

D) Find Pi

A computer algorithm must have: A) a specified input and output B) definiteness C) effectiveness D) all of the above

D) all of the above

To connect to the Internet with a wireless connection you'd need to communicate through a device that is physically connected to a network. This device is called a: A. port B. Ethernet C. switch D. wireless router

D) wireless router

HTML tags are words enclosed in: A. ( ) B. // \\ C. { } D. < >

D. < >

____ means to exactly specify every step in the sequence of operations for transforming the input into the output.

Definiteness

List ten devices that can be connected to a computer, and classify each as "input," "output," or "I/O" if it is both.

Device Input Output I/O a. Keyboard x b. Mouse x c. Camera x d. Microphone x e. Scanner x f. Printer x g. Speakers x h. Headphones x i. Monitor x j. External drives x

What are some of the criteria used for evaluating software when planning a purchase?

Ease of development, use and learning (for developers and users); reporting capability; general functionality; data handling; graphic presentation; performance; output options; environments and hardware; security; documentation; maintenance; vendor support; cost.

A gigabyte is exactly one billion bytes.

FALSE

A megabyte is exactly one million bytes.

FALSE

All HTML tags come in pairs.

FALSE

Heading tags create Web page headings that are bold and get less "strong" (smaller and perhaps not so bold) as the level number decreases.

FALSE

Quotation marks are not allowed inside of a tag.

FALSE

The instruction ADD 3000, 2000, 3080 adds 2000 and 3080 together, and places the result (5080) into the memory location having address 3000.

FALSE

The term "www" must be included when typing all Web addresses.

FALSE

Uniform resource locators (URLs) are software applications through which users access the Web.

FALSE

When a computer is connected to the Internet via ISP for the first time, it is assigned an IP that it keeps for the life of the computer.

FALSE

Algorithms are rare and seldom used outside of the field of computers.

FALSE Explanation: Algorithms are commonplace and are used often by nearly everyone. Most algorithms have been internalized so we think little about them.

Image files must be stored in their own folder.

FALSE (in the html folder)

In a software development life cycle, the coding steps should be allocated relatively more time.

FALSE, All 5 steps should be allocated equal amount of time.

What are the capacities of the following secondary storage devices: CD-ROM, DVD, Blue-Ray:

Floppy: CD: ~700 MB, DVD: ~ 4.7 GB, Blue-Ray: 25 GB/50 GB

Explain how a system that can do only a limited number of very simple tasks can accomplish an almost unlimited number of complicated tasks.

From the (high-level) standpoint of a driver, driving a car (once it is started) can be viewed as a continuous process of: checking in the mirrors for approaching cars, adjusting the direction of the car with the use of the steering wheel, controlling the speed and gear with the appropriate pedal(s) (and levers), checking the gauges of the car for any irregularities, etc. Each of these activities is simple, yet their combination is complex.

Using the WWW, explain where the unit "hertz" originated. Give at least four examples of places where that word is used, either correctly or incorrectly, that are not directly related to computers.

Hertz is used to measure waves (sound, electromagnetic, lights, etc.). Named after Heinrich Hertz who made important scientific contributions to the study of electromagnetism Some examples of places where the word "hertz" is used: Hertz rent a car Hertz Castle Hertz Trail Hertz Foundation Hertz Farm Management

___ is the data to be transformed during the computation to produce the output.

Input

Computers operate under a set of operations called the ______.

Instructions

Where does the Fetch part of the cycle get its instructions from? How does it know exactly where to go? Explain your answer in detail.

Instructions come from memory. It knows where to go based on the program counters position.

A network of networks is a good description of the ________.

Internet

How many bits in a kilobyte? megabyte? terabyte? (Express as numbers and as powers of 2)

Kilobyte: 2^10 =1024 bytes 1024 x 8 = 8192 bits Megabyte: 2^20 = 1,048,576 bytes 1,048,576 x 8 = 8,388,608 bits Terabyte: 2^40 = 1.0995116e+12 bytes 1.0995116e+12 *8 = 8.7960928e+12 bytes

English is an example of a(n) ________ language.

Natural

What is open source software and what are its advantages?

Open source software is a movement by computer programmers worldwide to help thwart the dominance of the Microsoft monopoly. The Netscape Mozilla browser is an example of open source software. They will allow anyone to have a copy of the computer code and users are allowed to modify the software as they wish. In return, users will share with Netscape Mozilla any changes or modifications they used to make the software. Advantages of open source software are that companies do not have to pay programmers to improve their product. Programmers from all levels of expertise will work to make your software better. It is cheaper than having to hire programmers and paying for costly revision.

__ is the data resulting from the computation, the intended result.

Output

A(n) ________ allows the processor to complete instructions faster than one per every five ticks by starting each before finishing the last, like an automobile assembly line.

Pipelining

Computers keep track of the next instruction to execute by its ______.

Program Counter

is an acronym for the name of the location where computer programs run and data is stored.

RAM

On the average, how many books can you store in a hard drive with a capacity of 500 Gigabytes? (Assume that an average book has 500 pages, an average page has 50 lines, an average line has 15 words, and finally an average word has 5 letters.)

Size of an average book: (500 pages x 50 lines x 15 words x 5 characters) bytes = 1,875,000 bytes Number of books = (500 Gigabytes x 8 x 1,024 x 1024 x 1024 x 1024) bytes / 1,875,000 bytes = 266 books

What are differences between systems software and applications software?

Systems software is a set of instructions that servers primarily as an intermediary between computer hardware and application programs. It provides important self-regulatory functions for computer systems, such as loading itself when the computer is first turned on, managing hardware resources such as secondary storage for all applications, and providing commonly used sets of instructions for all applications to use.

A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.

TRUE

A horizontal line is created using the <hr> tag.

TRUE

A local area network connects two or more communicating devices in a limited geographical area.

TRUE

A loop in an algorithm must include some test which can end the repetition.

TRUE

All HTML files must be text format files.

TRUE

All tags between a starting tag and an ending tag should be matched.

TRUE

An Internet service provider is a company that offers Internet connections for a fee.

TRUE

An algorithm must be a systematic method for producing a specified result.

TRUE

An example of a top-level domain is .edu.

TRUE

Each computer connected to the Internet is given its own unique Internet Protocol address.

TRUE

Every Web page is composed of a head and a body.

TRUE

Every memory location in the computer is numbered, starting at 0.

TRUE

Google Chrome is an example of a browser.

TRUE

HTML5 is the current standard language for describing web pages.

TRUE

Home computers typically link to the Internet via an ISP.

TRUE

Hyperlinks to pages on another Web site must contain an absolute URL, while onsite links may contain a relative URL.

TRUE

If you change the width of a photo image without changing the height of it, you will end up with a distorted image.

TRUE

Most interactions over the Internet use a protocol known as client/server interaction.

TRUE

Network interface cards (NICs) are special adapters that link an individual device to the communications medium on a local area network.

TRUE

Tags are words or abbreviations enclosed in angle brackets, < and >.

TRUE

The DNS translates your human-readable address into an IP number.

TRUE

The Internet is a global network of computer networks.

TRUE

The ability to store different values in its memory locations makes the computer a flexible tool.

TRUE

The horizontal rule <hr> tag is an example of single tags.

TRUE

The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.

TRUE

The rightmost part of an Internet name is the top-level specification, or the zone.

TRUE

The sequence of commands is important in an algorithm.

TRUE

The type of data, the amount of data, and the form of the data that the algorithm expects must be specified.

TRUE

What is the OSI model? What is the difference between the OSI model and the Internet model?

The ISO/OSI model is a widely used protocol that defines precisely how software of different systems interacts to accomplish the required functions. This model consists of seven levels, or layers, each with its own well-defined function. The OSI model has 7 layers, the Internet model has 5 layers.

Explain the following instruction: ADD 300, 1050, 1900.

This instruction will add the data stored in memory locations 1050 and 1900 and store it into the memory location represented by 300.

What is the reason for twisting wires in cables?

To minimize the interference from neighboring wires

Microsoft Windows Explorer is an example of a browser.

WRONG

In the Fetch/Execute Cycle, the action of retrieving the instruction's operands from memory occurs during the: a. Data Fetch (DF) step b. Instruction Fetch (IF) step c. Instruction Execute (EX) step d. Instruction Decode (ID) step

a) Data Fetch (DF) step

The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients

a) Modems

Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster

a) Top-level domain

The medium (coating) used for storing data on a hard disk is made from: a. iron b. plastic c. liquid d. light

a) iron

Modern computers know: a. only a handful of instructions b. a couple of dozen instructions c. about a hundred instructions d. thousands of instructions

a) only a handful of instructions

State what the following acronyms stand for: a. TCP/IP: b. LAN: c. WAN: d. MAN e. wLAN f. OSI

a. TCP/IP: transmission control protocol b. LAN: Local area network c. WAN: Wide area network d. MAN: Metropolitan Area Network e. Wireless LAN f. Open Systems Interconnection

Identify each part of the following URL: http://airandspace.si.edu/exhibitions/gal100/pioneer.html a. protocol ________ b. domain ________ c. top-level domain ________ d. pathname ________ e. Web page ________

a. protocol ________ http:// b. domain ________ airandspace.si.edu c. top-level domain ________ edu d. pathname ________ exhibitions/gal100/pioneer.html e. Web page ________ pioneer.html

A precise, systematic method for producing a specified result is a(n) ________.

algorithm

The highlighted text indicating the presence of a hyperlink is called the ________.

anchor text

Specifications inside a tag are called ______.

attributes

A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card.

b) A standard set of rules and procedures for the control of communications in a network.

Each site on the Internet gets assigned a network layer address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address

b) IP address

Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster

b) Name of the organization

Rerunning an instruction with the same data produces a. different results depending on the time of day b. exactly the same result every time c. different results depending on which computer it is run on d. Most of the time it is the same results but sometimes it is different

b) exact the same result every day

Which of the following is used for both input and output? a. keyboard b. flash drive c. mouse d. printer

b) flash drive

On the computer, one billion clock ticks per second is called: a. megahertz b. gigahertz c. nanohertz d. terahertz

b) gigahertz

The processor clock A) measures how long a program has been running. B) makes the machine cycle go on to the next step. C) keeps the the current time of day. D) measures the response time to user actions such as typing or clicking.

b) makes the machine cycle go on to the next step

Computer instructions are typically: a. 1 byte long b. 2 bytes long c. 4 bytes long d. 8 bytes long

c) 4 bytes long

There are ______ steps in the Fetch/Execute Cycle. a. 3 b. 4 c. 5 d. 6

c) 5

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of network does Gal have? a) Client-server b) Mainframe-based c) LAN d) WAN e) Peer-to-peer

c) LAN

Which of the following characteristics of a computer depends on the number of Fetch/Execute cycles it performs per second? a. memory size b. price c. speed d. ALU

c) speed

From largest to smallest, the correct order is: a. giga, kilo, mega, terra b. kilo, mega, giga, terra c. terra, giga, mega, kilo d. kilo, mega, terra, giga

c) terra, giga, mega, kilo

What does "random" in "random access memory" refer to? a. The fact that a request to the memory might return the contents of any location. b. The fact that memory units are unreliable, and may return any value. c. The fact that the computer can refer to the memory locations in any order. d. The fact that the amount of time required for the memory unit to respond is unknown ahead of time.

c) the fact that the computer can refer to the memory locations in any order.

HTML tags must be a. uppercase b. lowercase c. case does not matter d. either all uppercase or all lowercase

c. case does not matter

The common name for an integrated circuit is a computer ________.

chip

A computer is considered a(n) ________ when it gets services from another computer.

client

In the client/server structure, the customer's computer is the ________ and the business's computer is the ________.

client, server

The processor has how many moving parts? a. too many to count b. 8 c. 2 d. 0

d) 0

In the Fetch/Execute Cycle, the action of determining which operation is to be performed and computing the addresses of the operands occurs during the: a. Data Fetch (DF) step b. Instruction Fetch (IF) step c. Instruction Execute (EX) step d. Instruction Decode (ID) step

d) Instruction Decode (ID) step

Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster

d) Name of the specific computer

The Fetch/Execute Cycle operates: a. once a second b. thousands of times a second c. hundreds of thousands of times a second d. hundreds of millions of times a second

d) hundreds of millions of times a second

Two bytes of memory can store: a. any number b. one word c. one character d. two characters

d) two characters

The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these

e) All of these

Which of the following is a component of a local area network? a) File server b) Client computers c) Switch d) Network interface cards e) All of these

e) All of these

The Fetch/Execute Cycle consists of 4 steps.

fALSE (5 steps)

List the five steps in the Fetch/Execute cycle, and describe each. Explain how these steps correspond to eating at a restaurant

fetch (obtain next instruction); decode (understand instruction); fetch data (obtain data from memory to operate upon/with as needed); execute (actually do what the instruction describes); return result (store computed result as needed). Many possible answers for allegory: should compare to getting a menu, placing an order, eating the food when it arrives, and paying the bill afterward.

The property of ________ means that an algorithm must eventually stop.

finiteness

A user clicks on a(n) ________ to navigate from one Web page to another.

hyperlink

A(n) ________ is the name for a Web address of a page a user will go to when they click on a hyperlink.

hyperlink reference

HTML ________ whitespace.

ignores

The performance of modern days computers are measured by the number of _______ per second.

instructions

The ______ encodes keystrokes into binary form for the computer.

keyboard

A(n) ______ starts the computer, manages memory, and controls the peripherals

operating system

A(n) ________, such as Python, is a formal notation used to precisely define an algorithm.

programming language

In a Web address, http:// is the _________.

protocol

A(n) ________ is a computer that provides services to another computer.

server

To be accessed from other computers on the Internet, the HTML files, the image files, and the directory structure created for them must be ________ (transmitted) to a Web server.

uploaded

To improve readability of HTML text, the computer experts suggest adding ______ to the source instructions.

white space


संबंधित स्टडी सेट्स

MGT 2010 Chapter 3 Practice Test

View Set

World Geography: Chapter 15 Russia and the Republics Review

View Set

Human Motivation final quiz 8, 10-13

View Set

Chapter 8 - Groups, social processes, and communications

View Set