Object Oriented Programming Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An uninitialized variable contains a ____—the value last stored in the memory location reserved for that variable

"garbage" value (also called an undefined value)

Counter-controlled repetition requires

-the name of a control variable (or loop counter) -the initial value of the control variable -the loop-continuation condition that tests for the final value of the control variable (i.e., whether looping should continue) -the increment (or decrement) by which the control variable is modified each time through the loop.

A function prototype (also called a function declaration) tells the compiler

-the name of a function -the type of data returned by the function -the number of parameters the function expects to receive -the types of those parameters and -the order in which the parameters of those types are expected.

Stream insertion operator

<<

Input unit/Input device

A device that accepts data to be stored in memory

Open-source software

A software development style that departs from the proprietary development that dominated software's early years.

Packet switching

A technique in which digital data was sent in small bundles called packets.

ARPA proceeded to implement the _____, which eventually evolved into today's _____.

ARPANET; Internet

runtime errors (execution-time errors)

An error that occurs during the execution of a program. (divided by 0)

_____ were developed to convert early assembly-language programs to machine language.

Assemblers

The ____ are free, open-source libraries created by members of the C++ community.

Boost C++ Libraries

Central processing unit (CPU)

Brain of the computer that performs instructions defined by software

Most C++ programmers take advantage of the rich collections of classes and functions in the

C++ Standard Library.

can be used to force the averaging calculation to produce a floating-point numeric result

Cast operator

Arithmetic and logic unit

Designed to perform mathematical operations

a symbolic integer constant defined in the <iostream> header file

EOF

Android

Fastest growing mobile and smartphone operating system; open source and free

In 1989, Tim Berners-Lee of CERN (the European Organization for Nuclear Research) began to develop a technology for sharing information via hyperlinked text documents—called the

HyperText Markup Language (HTML).

ARPA accomplished this with the development of_______, truly creating a network of networks, the current architecture of the Internet.

IP—the Internet Protocol

Comma-separated list

If more than one name is declared in a declaration, the names are separated by commas

______ is crucial to good software engineering.

Information hiding

define and standardize the ways in which things such as people and systems interact with one another

Interfaces

_______ were developed to execute high-level language programs directly (without the need for compilation), although more slowly than compiled programs.

Interpreter programs

the last item pushed (inserted) is the first item popped (removed)

Last-in, first-out (LIFO) data structures

enables you to use one syntax to initialize a variable of any type

List initialization (also called uniform initialization)

Bytes

Made up of 8 bits; represents a single character

appear between a constructor's parameter list and the left brace that begins the constructor's body

Member initializers

_______ allows you to implement an object-oriented design as a working system.

Object-oriented programming (OOP)

argument in parentheses

Parameterized stream manipulator

Ada

Pascal based language

By convention, the name of a user-defined class begins with a capital letter, and for readability, each subsequent word in the class name begins with a capital letter. Often referred to as

Pascal case

is an artificial and informal language that helps you develop algorithms

Pseudocode (or "fake" code)

______ such as the popular web languages JavaScript and PHP are processed by interpreters.

Scripting languages

Operating Systems

Software systems that make using computers more convenient for users, application developers and system administrators.

specifies that the value of each bool expression should be displayed as either the word "true" or the word "false."

Stream manipulator boolalpha (a sticky manipulator)

The combined set of protocols is now commonly called

TCP/IP

The protocol (i.e., set of rules) for communicating over the ARPANET became known as

TCP—the Transmission Control Protocol

_____ is now the most widely used graphical scheme for modeling object-oriented systems.

The Unified Modeling Language (UML)

Microsoft developed the ______, consisting of a graphical user interface built on top of DOS

Windows operating system

escape character

\

escape sequence for newline

\n

A function prototype does not have to: a. Include parameter names. b. Terminate with a semicolon. c. Agree with the function definition. d. Match with all calls to the function.

a

An activation record will be popped off the function call stack whenever: a. A function returns control to its caller. b. A function calls another function. c. A function calls itself. d. A function declares a local variable.

a

An uninitialized local variable contains: a. The value last stored in the memory location reserved for that variable. b. No value. c. A value of zero. d. A randomly assigned value.

a

Assuming that the string object text contains the string "Hello!!! ", the "expression text.substr( 2 , 5 ) would return a string object containing the string: a. "llo!! ". b. "llo! ". c. "ello! ". d. "ello".

a

Consider the following code, assuming that x is an int with an initial value of 12 if( x = 6 ) cout << x; What is the output? a. 6 b. 12 c. Nothing. d. A syntax error is produced.

a

In the UML, the top compartment of the rectangle modeling a class contains: a. The class's name. b. The class's attributes. c. The class's behaviors. d. All of the above.

a

Labels are the only identifiers with: a. Function scope. b. File scope. c. Block scope.

a

Overloaded functions must have: a. Different parameter lists. b. Different return types. c. The same number of parameters. d. The same number of default arguments.

a

Pseudocode normally does not include: a. Declarations. b. Input/output. c. Algorithms. d. Control structures.

a

The conditional operator (?:): a. Is the only ternary operator in C++. b. Is a unary operator. c. Associates from left to right. d. Accepts two operands.

a

The rand function generates a data value of the type: a. unsigned int. b. int. c. long int. d. short int.

a

The unary scope resolution operator is used: a. To access a global variable when a local variable of the same name is in scope. b. To access any variable in an outer block when a local variable of the same name is in scope. c. To access a global variable when it is out of scope. d. To access a local variable with the same name as a global variable.

a

Variables are also known as: a. lvalues, but can be used as rvalues. b. lvalues, and cannot be used as rvalues. c. rvalues, and cannot be used as lvalues. d. Constant variables.

a

Which of the following expressions returns the trigonometric sine of x? a. sin( x ). b. sine( x ). c. trig_sin( x ). d. trig_sine( x ).

a

Which of the following is not true of static local variables? a. They are accessible outside of the function in which they are defined. b. They retain their values when the function in which they are defined terminates. c. They are initialized to zero if not explicitly initialized by the programmer. d. They can be of type int.

a

Hypertext Transfer Protocol (HTTP)

a communications protocol used to send information over the web.

A variable is

a location in the computer's memory where a value can be stored for use by a program.

A preprocessing directive is

a message to the C++ preprocessor.

Web 2.0

a new generation of internet services that emphasize online collaboration and sharing

A nonfatal logic error allows

a program to continue executing, but usually produces incorrect results

A fatal logic error causes

a program to fail and terminate prematurely

each class is modeled in a UML class diagram as

a rectangle with three compartments.

special value used to indicate "end of data entry" called

a sentinel value (also called a signal value, a dummy value or a flag value)

contains the return address that the called function needs in order to return to the calling function

a stack frame or an activation record

A keyword is

a word in code that is reserved by C++ for a specific use.

The ___ may be repeated, but this is unnecessary and can be confusing.

access specifiers public and private

get functions are also sometimes called

accessors

procedure for solving a problem in terms of the actions to execute and the order in which the actions execute

algorithm

Nonfatal runtime errors

allow programs to run to completion, often producing incorrect results

World Wide Web

allows you to locate and view multimedia-based documents on almost any subject over the Internet.

Cloud computing

allows you to use software, hardware and information stored in the "cloud"

LAMP

an acronym for the set of open-source technologies that many developers use to build web applications; stands for Linux, Apache, MySQL, and PHP

Database

an electronic collection of data that's organized for easy access and manipulation

Moore's Law is

an observation made by Intel co-founder Gordon Moore in 1965. He noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention.

Using a loop's counter control variable in a calculation after the loop often causes a common logic error called

an off-by-one error

Platform as a Service (PaaS)

another capability of cloud computing

Web 2.0 embraces an ______—a design that encourages user interaction and community contributions.

architecture of participation

An important feature of function prototypes is

argument coercion

A function call supplies values—called ____—for each of the function's parameters.

arguments

English-like abbreviations to represent elementary operations. These abbreviations formed the basis of ______.

assembly languages

An identifier's storage class: a. Determines whether an identifier is known only in the current source file or in any source file with proper declarations. b. Determines the period during which that identifier exists in memory. c. Determines where the identifier can be referenced in a program. d. All of the above.

b

The inline keyword: a. Increases function-call overhead. b. Can reduce a function's execution time but increase program size. c. Can decrease program size but increase the function's execution time. d. Should be used with all frequently used functions.

b

Which of the following does not display correct if answer is equal to 7 and incorrect if answer is not equal to 7? a. if ( answer == 7 ) cout << "correct"; else cout << "incorrect"; b. cout << answer == 7 ? "correct" : "incorrect"; c. cout << ( answer == 7 ? "correct" : "incorrect" ); d. answer == 7 ? cout << "correct" : cout << "incorrect";

b

Which of the following is not one the rules for forming structured programs? a. Begin with the "simplest activity diagram." b. Any transition arrow can be reversed. c. Any action state can be replaced by two action states in sequence. d. Any action state can be replaced by any control statement.

b

Which of the following is true? a. Assigning a double value to an int does not lose any data. b. For fundamental-type variables, list-initialization syntax prevents narrowing conversions that could result in data loss. c. For fundamental-type variables, list-initialization syntax allows narrowing conversions that could result in data loss. d. None of the above.

b

Which of the following is true? a. You can initialize data members of a class only in the class's constructor. b. C++11 allows you to provide a default value for a data member when you declare it in the class declaration. c. You cannot initialize data members of a class. d. None of the above

b

Which of the following statements is false? a. The concepts of icons, menus and windows were originally developed by Xerox PARC. b. Windows is an open source operating system. c. The software that contains the core components of the operating system is called the kernel. d. Linux source code is available to the public for examination and modification.

b

The = operator and the + operator are called ____ because each has two operands.

binary operators

Identifiers declared inside a block have ___, which begins at the identifier's declaration and ends at the terminating right brace (}) of the block in which the identifier is declared.

block scope

All of the following are true of functions except: a. They define specific tasks that can be used at many points in a program. b. A function call must specify the name and arguments of the function. c. The definition of a function usually is visible to other functions. d. The implementation of a function is hidden from the caller.

c

Assuming that GradeBook.h is found in the current directory and the iostream header file is found in the C++ Standard Library header file directory, which of the following preprocessor directives will fail to find its desired header file? a. #include <iostream> b. #include "iostream" c. #include <GradeBook.h> d. #include "GradeBook.h"

c

Converting from type ________ to type ________ will result in the loss of data. a. bool, char. b. float, double. c. int, char. d. short, long.

c

Enumeration constants: a. Must have unique integer values. b. Can be assigned other values once they've been defined. c. Must have unique identifiers. d. Are declared using the keyword const.

c

Recursion is to the base case as iteration is to what: a. The counter. b. A repetition structure. c. Failure of the loop continuation test. d. A selection structure.

c

Specifying the order in which statements are to be executed in a computer program is called: a. An algorithm. b. Transfer of control. c. Program control. d. Pseudocode.

c

When a client code programmer uses a class whose implementation is in a separate file from its interface, that implementation code is merged with the client's code during the: a. Programming phase. b. Compiling phase. c. Linking phase. d. Executing phase.

c

Which of the following does the C++ compiler not examine in order to select the proper overloaded function to call? a. Types and order of the arguments in the function call. b. The number of arguments in the function call. c. The return type of the function. d. It examines all of the above.

c

Which of the following is false? a. An engine implements a random-number generation algorithm that produce pseudorandom numbers. b. A distribution controls the range of values produced by an engine, the types of those and the statistical properties of the values. c. The default range of a uniform_int_distribution is from 0 to 32767. d. C++11 provides many classes that represent various random-number generation engines and distributions.

c

_____ capitalization style allows the first letter to be either lowercase or uppercase

camel case

C++ is ___ sensitive

case

Fatal runtime errors

cause programs to terminate immediately without having successfully performed their jobs

standard error system

cerr

Software reuse

changing of existing software to tailor to a programmer's needs

Digits, letters, and special symbols are known as

characters

The Unicode character set contains

characters for many of the world's languages

standard input stream

cin

In C++, we create a program unit called a ____ to house the set of member functions that perform the class's tasks.

class

C++ programs consist of pieces called _____ and _____

classes; functions

any class or function that calls the object's member functions from outside the object

client of an object

Access specifiers are always followed by a

colon

An attempt by a function, which is not a member of a particular class to access a private member of that class is a

compilation error

Forgetting to include the appropriate header when using standard library functions is a

compilation error

A syntax error occurs when the

compiler encounters code that violates C++ language rules

Syntax errors are also called

compiler errors, compiletime errors, or compilation errors

Translator programs called _______ convert high-level language programs into machine language.

compilers

Fields

composed of characters or bytes

by enclosing the body statements in a pair of braces, { }, creating what's called a

compound statement or a block

Computers process data under the control of sequences of instructions called

computer programs

Using multiple stream insertion operators (<<) in a single statement is referred to as

concatenating, chaining or cascading stream insertion operations

a state in which the object's data member contains a valid value

consistent state

Each class can provide one or more _____ that can be used to initialize an object of the class when the object is created

constructors

Only one other way to connect control statements—called

control-statement nesting

Control statements are attached to one another by connecting the exit point of one to the entry point of the next Called

control-statement stacking

standard output stream

cout

A variable that can have values only in the range 0 to 65535 is a: a. Four-byte int. b. Four-byte unsigned int. c. Two-byte int. d. Two-byte unsigned int.

d

All of the following are reasons to use recursion except: a. An iterative solution is not apparent. b. The resulting program is easier to debug. c. It more naturally mirrors the problem. d. It maximizes execution performance.

d

An example of a unary operator is: a. The < relational operator. b. The = assignment operator. c. The % arithmetic operator. d. The ! logical operator.

d

Consider the execution of the following for loop for (int x = 1; x < 5; increment ) cout << x + 1 << endl; If the last value printed is 5, which of the following might have been used for increment? a. x++ b. x += 1 c. ++x d. Any of the above.

d

In regards to default arguments, which of the following is false? a. When an argument is omitted in a function call, the default value of that argument is automatically inserted by the compiler and passed in the function call. b. They must be the rightmost (trailing) arguments in a function's parameter list. c. Default values can be constants. d. Default values cannot be global variables or function calls.

d

Of the following, which is not a logic error? a. Not placing curly braces around the body of an if that contains two statements. b. Using == to assign a value to a variable. c. Failing to initialize counter and total variables before the body of a loop. d. Using commas instead of the two required semicolons in a for header.

d

The expression if ( num != 65 ) cannot be replaced by: a. if ( num > 65 || num < 65 ) b. if ( !( num == 65 ) ) c. if ( num - 65 ) d. if ( !( num - 65 ) )

d

Which of the following C++ Standard Library headers does not contain a C++ Standard Library container class? a. <vector>. b. <list>. c. <stack>. d. <string>.

d

Which of the following data types can be used to represent integers? a. char b. long c. short d. All of the above.

d

Which of the following is false? a. The effects of break and continue statements can be achieved by structured programming techniques. b. break and continue statements can make a program perform faster than with the corresponding structured techniques. c. Many programmers feel that break and continue violate structured programming. d. You should always try to write the fastest, smallest code possible before attempting to make it simple and correct.

d

Which of the following is false? a. break and continue statements alter the flow of control. b. continue statements skip the remaining statements in current iteration of the body of the loop in which they are embedded. c. break statements exit from the loop in which they are embedded. d. continue and break statements may be embedded only within repetition statements.

d

Which of the following is not included in a function's activation record? a. The return address of its caller function. b. Parameter values received from its caller. c. Local variables it has declared. d. The name of the function.

d

Which of the following statements is false? a. Object-oriented programming is today's key programming methodology. b. C++ is one of today's most popular software development languages. c. Software commands computer hardware to perform tasks. d. In use today are more than a trillion general-purpose computers and trillions more cellphones, smartphones and other handheld devices.

d

Which statement is false? a. Classes are reusable software components. b. A class is to an object as a blueprint is to a house. c. Performing a task in a program requires a method. d. A class is an instance of its object.

d

Declaring data members with access specifier private is known as

data hiding

Data items processed by computers form a __________ that becomes larger and more complex in structure as we progress from bits to characters to fields, and so on.

data hierarchy

declared inside a class definition but outside the bodies of the class's member-function definitions

data members

The benefits of data integrity are not automatic simply because

data members are made private

Attributes are specified by the class's

data members.

Any constructor that takes no arguments is called a

default constructor

If a class does not explicitly include constructors, the compiler provides a ______ with no parameters

default constructor

it's more precise to call a declaration that also reserves memory a

definition

Pascal

designed for teaching structured programming and was popular in college courses for several decades

When a value is placed in a memory location, the value overwrites the previous value in that location; thus, placing a new value into a memory location is said to be

destructive

Fortran

developed by IBM Corporations to be used for scientific and engineering applications that require complex mathematical computations

COBOL

developed by computer manufacturers, the U.S. government and industrial computer users based on a language developed by Grace Hopper

Basic

developed in 1960s in Dartmouth college to familiarize novices with programming techniques

Prompt

directs the user to take a specific action

Experience has shown that the best way to develop and maintain a large program is to construct it from small, simple pieces, or components. This technique is called

divide and conquer

The if...else statement is called a ___ because it selects between two different actions

double-selection statement

To help you prepare for the larger programs you'll encounter later in this book and in industry, we often use a separate source-code file containing function main to test our classes (this is called a ______).

driver program

C++ programs typically go through six phases:

edit, preprocess, compile, link, load and execute

White space

empty spaces in a design

Classes _______attributes and member functions into objects—an object's attributes and member functions are intimately related.

encapsulate (i.e., wrap)

An ____, introduced by the keyword enum and followed by a type name, is a set of integer constants represented by identifiers.

enumeration

Logic errors

errors that cause programs to execute incorrectly.

A linker links the object code with the code for the missing functions to produce an

executable program

the computer, under the control of its CPU, _____ the program one instruction at a time.

executes

Dividing by zero results in a

fatal runtime error

Release candidates

feature complete and bug free and ready for use by the community

(UML)The solid circle surrounded by a hollow circle that appears at the bottom of the activity diagram represents the

final state

Variables of type ___ represent single-precision floating-point numbers and have seven significant digits on most of today's systems.

float

One of the most important mechanisms for computer science students to understand is the

function call stack (or program execution stack).

function call stack (or program execution stack) supports the

function call/return mechanism.

The first line of a function definition is commonly called the

function header

several functions of the same name to be defined, as long as they have different signatures

function overloading

a declaration of a function that tells the compiler the function's name, its return type and the types of its parameters

function prototype

Labels (identifiers followed by a colon such as start: or a case label in a switch statement) are the only identifiers with

function scope

The portion of a function prototype that includes the name of the function and the types of its arguments is called the

function signature or simply the signature

The only identifiers with ___ are those used in the parameter list of a function prototype.

function-prototype scope

Library function ____ reads a line of text into a string.

getline

Sometimes functions are not members of a class. Called

global functions

An identifier declared outside any function or class has

global namespace scope

Record

group of related fields

File

group of related records

A computer consists of various devices referred to as

hardware

Output unit/Output device

hardware that gives the user feedback

.h filename extension—known as a

header

Smart pointers

help you avoid errors associated with traditional pointers.

Ajax

helps Internet-based applications perform like desktop applications

A variable name is any valid ____ that is not a keyword

identifier

The _____ allows a program to take alternative action based on whether a condition is true or false.

if statement

Multi-core processor

implements multiple processors on a single integrated-circuit chip

Sentinel-controlled repetition is often called

indefinite repetition

A new class of objects can be created quickly and conveniently by ______—the new class absorbs the characteristics of an existing class, possibly customizing them and adding unique characteristics of its own.

inheritance

#include <iostream> notifies the preprocessor to include in the program the contents of the

input/output stream header file <iostream>.

An object is then referred to as an ______ of its class.

instance

Provide tools that support the software-development process, including editors for writing and editing programs and debuggers for locating logic errors

integrated development environments (IDEs)

The ____ describes what services a class's clients can use and how to request those services, but not how the class carries out the services

interface of a class

Memory unit/memory/primary memory

internal data storage in a computer

Declarations

introduce identifiers into programs.

Refactoring

involves reworking programs o make them clearer and easier to maintain while preserving their correctness and functionality

The software that contains the core components of the operating system is called the

kernel

Java

key goal is to be able to write programs that will run on a great variety of computer systems and computer-control devices

The UML is ____—it's used with many different programming languages

language independent

The UML represents data members as attributes by

listing the attribute name, followed by a colon and the attribute type

Variables declared in a function definition's body are known as ____ and can be used only from the line of their declaration in the function to the closing right brace (}) of the block in which they're declared

local variables

Variable names such as number1, number2 and sum actually correspond to _____ in the computer's memory.

locations

In some cases, writing != as =! will not be a syntax error, but almost certainly will be a

logic error

Placing a semicolon after the condition in an if statement leads to a

logic error

forgetting a break statement when one is needed in a switch statement is a

logic error

Confusing the equality operator == with the assignment operator = results in

logic errors

Omitting the braces that delimit a block can lead to

logic errors

Regardless of differences in physical appearance, computers can be envisioned as divided into various

logical units or sections

Variable names are said to be

lvalues

Any computer can directly understand only its own ______, defined by its hardware architecture.

machine language (also called machine code)

Performing a task in a program requires a

member function

Each message is implemented as a _______ that tells a member function of the object to perform its task.

member function call

The promotion rules apply to expressions containing values of two or more data types also referred to as

mixed-type expressions

C

most of code for general-purpose operating systems is written in C or C++

Linux

most popular open-source operating system; Popular in servers, personal computers and embedded systems

The switch selection statement is called a ___ because it selects among many different actions

multiple-selection statement

Set functions are also sometimes called

mutators

For fundamental-type variables, list-initialization syntax also prevents so-called ____ that could result in data loss.

narrowing conversions

When a value is read out of a memory location, the process is

nondestructive

a set of random numbers that can't be predicted

nondeterministic random numbers

PHP

object-oriented , "open-source" "scripting" language supported by a community of users and developers and is used by numerous websites

If this process involves analyzing and designing your system from an object-oriented point of view, it's called an

object-oriented analysis and design (OOAD) process.

Objective-C

object-oriented language based on C

Using an incorrect relational operator or using an incorrect final value of a loop counter in the ocndition of a while or for statement can cause

off-by-one errors

C#

one of Microsoft's three object-oriented primary programming languages

Perl

one of the most widely used object-oriented scripting languages for web programming

Ruby on rails

open source, object-oriented programming language with a simple syntax that's similar to Perl and Python

Additional information that a function needs to perform its task is known as a

parameter

To specify that a function requires data to perform its task, you place additional information in the function's _____, which is located in the parentheses following the function name.

parameter list

Two ways to pass arguments to functions in many programming languages are

pass-by-value and pass-by-reference

A statement instructs the computer to

perform an action.

The C++ preprocessor obeys commands called ______, which indicate that certain manipulations are to be performed on the program before compilation.

preprocessing directives

A ____ program executes automatically before the compiler's translation phase begins

preprocessor

Automatic storage is an example of the

principle of least privilege

Computer programs guide the computer through ordered actions specified by people called computer

programmers

Windows is a ______ operating system—it's controlled by Microsoft exclusively.

proprietary

Design patterns

proven architectures for constructing flexible and maintainable object-oriented software

Function rand actually generates

pseudorandom numbers

A class's public interface consists of the class's public member functions (also known as the class's ___).

public services

a function that calls itself, either directly, or indirectly (through another function)

recursive function

As in algebra, it's acceptable to place unnecessary parentheses in an expression to make the expression clearer.These are called

redundant parentheses

an alias for its corresponding argument in a function call.

reference parameter

several storage-class specifiers that determine a variable's storage duration:

register, extern, mutable and static.

Beta

released to a larger number of developers later in the development process after most major bugs have been fixed and new features are nearly complete

When you define a function, you must specify a ____ to indicate the type of the value returned by the function when it completes its task.

return type

Constants are said to be

rvalues

Agile software development

s set of methodologies that try to get software implemented faster and using fewer resources than previous methodologies

The portion of the program where an identifier can be used is known as its

scope

This restricted use of the control variable name is known as the variable's

scope

Each member-function name is preceded by the class name and ::, which is known as the

scope resolution operator

Function srand takes an unsigned integer argument and ____ the rand function to produce a different sequence of random numbers for each execution.

seeds

Choosing meaningful identifiers makes a program

self-documenting

statement terminator

semicolon (;)

EOF stands for "end-of-file". Commonly used as a

sentinel value

statements in a program execute one after the other in the order in which they're written

sequential execution

This performance feature for the evaluation of logical AND and logical OR expressions is called

short-circuit evaluation

Visual Basic

simplified the development of Microsoft windows applications

A block can be placed anywhere in a program that a

single statement can be placed

A comment beginning with // is called a _____ because it terminates at the end of the current line.

single-line comment

The if selection statement is a ___ because it selects or ignores a single action

single-selection statement

The programs that run on a computer are referred to as

software

Continuous beta

software that's developed using this approach generally does not have version numbers

.cpp file, also known as a

source-code file

URL (Uniform Resource Locator)

specifies the address (i.e., location) of the web page displayed in the browser window.

If more function calls occur than can have their activation records stored on the function call stack, an a fatal error known as ___ occurs

stack overflow

When a cout statement executes, it sends a stream of characters to the ____—which is normally "connected" to the screen.

standard output stream object—std::cout

Stream manipulators fixed and setprecision remain in effect until they're changed—such settings are called

sticky settings

Arithmetic expressions in C++ must be entered into the computer in

straight-line form

std::endl is a so-called

stream manipulator

Together, the quotation marks and the characters between them are called a

string, a character string or a string literal.

Forgetting the semicolon at the end of a class definition is a

syntax error

The keystroke combinations for entering end-of-file are

system dependent

(UML)The solid circle at the top of the diagram represents

the activity's initial- state—the beginning of the workflow before the program performs the modeled activities.

Alpha

the earliest release of a software product that's still under active development

Secondary storage unit

the long-term, high-capacity "warehousing" section

The syntax of a programming language specified

the rules for creating proper programs in that language

All programs could be written in terms of only three control structures

the sequence structure the selection structure and the repetition structure

A computer's character set is

the set of all the characters used to write programs and represent data items

Bit

the smallest unit of data in a computer; binary digit 1s and 0s

Software as a Service (SaaS)

the software runs on servers elsewhere on the internet

Hypertext Transfer Protocol Secure (HTTPS) is

the standard for transferring encrypted data on the web

Software Development Kits (SDKs)

the tools and documentation developers use to program applications

statements enable you to specify that the next statement to execute may be other than the next one in sequence

transfer of control

The compiler encodes each function identifier with the types of its parameters (sometimes referred to as name mangling or name decoration) to enable

type-safe linkage.

Fundamental types

types such as int, double, and char

access a global variable when a local variable of the same name is in scope

unary scope resolution operator (::)

Functions in the same scope must have

unique signatures

Regular expressions

used to match specific character patterns in text

Functions you write are referred to as

user-defined functions

The compiler does not automatically know what type GradeBook is—it's a

user-defined type

In industrial-strength code, always

validate all inputs

escape sequence

when another character follows a backslash

Loader

which takes the executable image from disk and transfers it to memory

An activity diagram models the ____ of a portion of a software system.

workflow (also called the activity)


संबंधित स्टडी सेट्स

BIO 141-The Skeletal System and Bone Tissue-Chapter 6

View Set

CH 9 LEARN SMART MANAGERIAL ACCOUNTING

View Set

Unity Test Questions Part 2 51-100

View Set

Exponential Growth Functions: Assignment

View Set

APC EEC 4.4-4.6 (ATMOSPHERE, WIND, WATERSHEDS)

View Set