Computer Science Questions
Like _____, hard disks store data magnetically.
- Floppy disks - Zip disks
How many things can be represented in 4 bits?
16
The method that creates an object based on a class definition is called ____________.
A constructor
if-else statement
A selection statement that allows a program to perform alternative actions based on a condition.
Which gate produces a 1 only if all its inputs are 1 and a 0 otherwise?
AND Gate
___________ is an ordered collection of unambiguous, executable steps that defines a terminating process.
Algorithm
Which of these is necessary to protect your computer from security threats such as viruses and trojan horses?
Antivirus, firewall software, and updating the OS
A _____ is the smallest unit of data a computer can process.
Bit
Which of the following is an example of a language that is based on the imperative programming paradigm?
C
Which of the following is not an application of the Internet? (These are applications of the internet FTP, email, or Telnet)
CERT
The component inside of the computer that executes program instructions and performs calculations is the:
CPU
Which of the following is a task that is not performed by the kernel of an operating system?
Communicate with the user
A(n) __________ is a special method in a class—it is executed automatically when a new object is instantiated.
Constructor
List the steps for converting a binary number to its negative two's complement value in base-2.
Copy the bits from right to left. After copying the first bit that is a 1, reverse all the remaining bits.
When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.
DNS Server
Which of the following events is detrimental to an operating system's performance?
Deadlock
Data is stored inside of the computer in the form of 0's and 1's. This is referred to as:
Digital Form
Given the following S/R Latch and the information that S and R are currently 1, X is 0 and Y is 1, what would need to be done to set the X output line to 1?
Drop S (or the top) low momentarily
The process of encoding information that is passed over the Internet to prevent others from seeing it is called:
Encryption
A means of implementing a network with the bus topology is __________________ .
Ethernet
The smaller the distance between pixels on a monitor, the less clear the image.
False
Which of the following federal laws regulates the disclosure of student records?
Family Educational Rights and Privacy Act of 1974
What do we call the representation of a real number that keeps track of the sign, radix, mantissa, and the exponent?
Floating Point Notation
_____ is copyrighted software provided at no cost to a user by an individual or a company.
Freeware
With a _____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
GUI (Not Command Line Interface)
A _____ occurs when a read/write head touches the surface of a hard disk platter, such as that shown in the accompanying figure, usually resulting in a loss of data and sometimes loss of the entire drive.
Head Crash
What is the relationship between A and B in the UML class diagram below? A ^ | B
Inheritance
On a CPU, what is the name of the register that contains the instruction currently being executed?
Instruction Register
_____ is/are the steps that tell the computer how to perform a particular task.
Instructions
A(n) __________ error occurs whenever the program successfully terminates but does not successfully complete the task.
Intent
The major carriers of network traffic on the Internet are known collectively as the _____.
Internet Backbone
A ______________ is used to translate a computer program into machine language so it can be executed.
Interpreter and Compiler
A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
LAN (Local Area Network)
The _____ defines a popular video compression standard.
MPEG (Moving Pictures Experts Group)
Examples of nonvolatile storage media include all of the following except _____.
Memory
Two inputs, one source on top, one ground, and one output
NAND
Which of the following is used to translate between IP addresses and mnemonic addresses?
Name server
A collection of two or more computers or devices that are connected in some fashion and can communicate with one another is called a:
Network
The following Boolean expression represents which gate? X = A + B
OR
_____________ have two capabilities: they do things and they remember things.
Objects
Two types of system software are _____.
Operating systems, utility programs
_____ is mass produced, copyrighted retail software that meets the needs of a variety of users, not just a single user or company.
Packaged software
What do we call a variable that is used to pass information to a function?
Parameter
The _____ is the destructive event or prank a malicious-logic program is intended to deliver.
Payload
In the Architecture for the Machine from Appendix C, what is the name of the register that contains the address of the next instruction to be executed?
Program counter
_____ is free software, but it has been donated for public use and has no copyright restrictions.
Public Domain Software
_____ is the most common type of volatile memory.
RAM
Programs and data are held in this hardware component when the machine is turned on. The CPU accesses programs and data that reside here. If the power is turned off, all contents are erased. This component is:
Random Access Memory (RAM)
Which of the following is NOT associated with object oriented programming?
Resolution
Which of the following is not a way of classifying networks?
Router versus bridge
_____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
Secure HTTP (S-HTTP)
In a ______ circuit, the output is determined by the input as well as the existing state of the circuit.
Sequential
____ is copyrighted software that is distributed free for a trial period.
Shareware
All of the following are advantages of networks except: (Communication, shared hardware, and shared data are advantages)
Software Debugging
On a _____, all of the computers and devices (nodes) on the network connect to a central device.
Star Network
Which are network topologies (may be more than 1 answer)? (Not cloud or packet)
Star and Bus
The part of a computer program that says how the instructions of the language can be put together is called ______________.
Syntax
The processor, memory, and storage devices are housed in a box-like case called the ____.
System Unit
Internet transmissions commonly use _____.
TCP/IP
This sub category of malicious logic program pretends to be legitimate software or data and sneaks into a computer.
Trojan Horse
As a rule, employers and colleges can monitor the Internet usage of employees and students.
True
No single person, company, institution, or government agency controls or owns the Internet.
True
System software serves as the interface between the user and/or application software, and the computer s hardware.
True
To input video from analog devices, the analog signal must be converted to a digital signal.
True
To use application software, a computer must be running system software, specifically, an operating system.
True
Your computer can contract a virus from a Web site by just visiting the home page of the Web site with your browser.
True
When someone uses a computer and/or network without permission or for a purpose that is prohibited, this is referred to as:
Unauthorized use and access
_____ is one of the most widely used coding schemes used to represent text data.
Unicode
A URL is:
Uniform Resource Locator, the address of a Web resource
One popular use of the _____ standard is in public Internet access points that offer mobile users the ability to connect to the Internet with their wireless computers and devices.
WiFi
A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.
Worm
The following truth table represents which gate? A B X 0 0 0 0 1 1 1 0 1 1 1 0
XOR
Each of the following is a commonly used output device except _____.
a scanner
A program is _____.
a series of instructions that tells a computer what to do and how to do it
The Internet is:
a worldwide network of computers
Programs such as Microsoft Word are classified as __________ software.
application
A good practice is to ________________ data and information on a regular basis to guard against system failure or security breaches.
back up
A nanosecond (abbreviated ns) is one _____ of a second.
billionth
In a _____, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions
command-line interface
The For statement...
executes a block of code many times.
In the machine cycle, _____ is the process of obtaining a program instruction or data item from memory.
fetching
The wider the bus, the _____ the transfer of data.
fewer the number of transfer steps required and the faster
Setting a monitor to display a higher resolution uses a _____.
greater number of pixels and thus provides a smoother image
To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment.
hardware theft
In a Web address, the _____, is a set of rules the defines how pages transfer on the Web.
http, which stands for Hypertext Transfer Protocol
The World Wide Web uses ________ to allow users to jump from one site to another.
hypertext links
The purpose of computer security is to _____________________________ .
maintain computers and networks that are operationally reliable and secure the confidentiality of the information that computers and networks handle
Desk checking, walk-throughs, and inspection are ______________ .
methods useful for verifying correctness of algorithms.
The design of computers, devices, and media in a network, sometimes called the _____, is categorized as either client/server or peer-to-peer.
network architecture
Tape _____.
no longer is used as a primary method of storage but is used most often for long-term storage and backup
A(n) ____ is system software.
operating system
A CD or DVD is an example of:
optical storage
What is the top level domain in the URL "http://www.apa.org/"?
org
All of the following are widely used input devices except the _____.
printer and monitor
The programming control structures used in a procedural programming language are:
sequence, repetition, decision
The difference between a Do loop and a While loop is _______________________.
the Do loop checks the condition after the loop runs once, but the While loop checks the condition before executing any instructions.
Memory stores _____.
the operating system and other system software, application programs that carry out a specific task, the data being processed and the resulting information
The Internet can be generally characterized as
the world's largest network