computer science 150 Chapter 1 quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An application that provides the user with pictures and menus from which to select commands and data is said to have a(n) __________. 1) GUI 2) command-line interface 3) IDE 4) CPU 5) compiler

1) GUI

The first electronic digital computer was designed in the late 1930s by __________. 1) John Atanasoff and Clifford Berry 2) John von Neumann 3) Steve Jobs and John Eckert 4) Albert Einstein 5) Niklaus Wirth

1) John Atanasoff and Clifford Berry

The component of a digital computer that can compare data stored in its registers is the __________. 1) arithmetic logic unit (or CPU) 2) logical comparison unit 3) cable Internet access 4) register bank 5) central logic unit

1) arithmetic logic unit (or CPU)

The __________ verifies a user's right to access a computer and data. 1) operating system 2) compiler 3) interpreter 4) CPU 5) editor

1) operating system

Modifying someone else's code and claiming that it is your own is called __________. 1) plagiarism 2) hacking 3) computer abuse 4) computer fraud 5) none of the above

1) plagiarism

Which programming language is typically used for Android development? 1) C 2) Java 3) Python 4) C# 5) Perl

2) Java

The Internet is an example of a __________. 1) LAN 2) WAN 3) CPU 4) file server 5) modem

2) WAN

Performing each step of an algorithm by hand the same as a computer would to verify the algorithm is correct is called a(n) __________. 1) step-wise refinement 2) desk check 3) top-down design 4) program maintenance 5) software development

2) desk check

Information stored in secondary storage is organized into aggregates called __________. 1) hardware 2) files 3) bytes 4) memory cells 5) none of the above

2) files

An integrated circuit containing the full circuitry of a CPU is called a _________. 1) mainframe 2) processor chip 3) memory chip 4) supercomputer 5) RAM

2) processor chip

Copyright laws are used to help protect a company from __________. 1) computer fraud 2) software piracy 3) worms 4) viruses 5) plagiarism

2) software piracy

The ability to store programs as well as data is called the __________. 1) top-down design process 2) stored program concept 3) software development method 4) boot process 5) algorithm design

2) stored program concept

Modelling a problem by extracting the essential variables and their relationships is called a(n) __________. 1) algorithm 2) interface 3) abstraction 4) top-level design 5) top-down design

3) abstraction

Which programming language adds object-oriented features to C? 1) Objective C 2) PHP 3) C# 4) C++ 5) Java

4) C++

The proper sequence of steps needed to correct invalid statements and reexecute a program is: 1) Enter the editor, make corrections, link the program, reload the program, and save the program. 2) Enter the editor, compile, load the program, correct statements, link the program, and save the program. 3) Enter the editor, insert corrected statements, load, compile, and execute the program. 4) Enter the editor, correct invalid statements, save the program, compile, link, load, and execute the program. 5) none of the above

4) enter the editor, correct invalid statements, save the program, compile, link, load and execute the program

Keeping a program up-to-date and correcting previously undetected errors is part of __________. 1) testing 2) step-wise refinement 3) software development 4) maintenance 5) compiling

4) maintenance

Which of the following is not an advantage of a highlevel language? 1) It is easier to use than machine language. 2) Its statements resemble English. 3) It is portable. 4) Memory can be referenced symbolically. 5) It is easy for the machine to understand.

5) It is easy for the machine to understand

Which programming language is used by Apple for iPhone application software? 1) Perl 2) C# 3) Java 4) JavaScript 5) Objective C

5) Objective C

The object file is created by the __________. 1) editor 2) linker 3) loader 4) central processing unit 5) compiler

5) compiler

__________________________ is a high-speed Internet connection that uses the same coaxial cable that carries cable TV.

Cable Internet Access

Machine language is the same for all CPUs.

False

Temporary storage for programs and data is called ________

Machine language

______________stores instructions burned at the factory and is non-volatile.

Read-only memory

A list of instructions provided to the computer is called a program.

True

Part of the operating system is typically store in ROM for faster booting.

True

Programs that help a user accomplish specific tasks are called ____________

application

A(n) _________ is the amount of memory required to store a single binary digit.

bit

A(n) _________ is the amount of memory required to store a single character.

byte

The part of the computer responsible for retrieving data and instructions from memory for processing is the __________. 1) hardware 2) loader 3) central processing unit 4) linker 5) instructiondatafetch unit

central processing unit

A syntax error in a program is an error that causes the program to produce incorrect output.

false

Main memory is typically capable of storing more information than a secondary storage device.

false

Statements in a highlevel language are converted to statements in machine language by a loader.

false

When a program begins to execute, the contents of the memory cells it uses are initially empty.

false

A microphone is an example of a(n) _________ device.

input

Data that is taken from the keyboard during program execution is called ___________ data.

input

A(n) _________ converts computer data into audio tones that can be transmitted over a normal telephone circuit.

modem

In a laboratory, several computers may be linked together on a local area ______________

network

The part of the computer that allocates memory and processor time is the __________________.

operating system

A payroll report is an example of program ______________.

output

A speaker is an example of a(n) ___________ device.

output

In a command-line interace, the ____________indicates the computer is ready for input.

prompt

Special high-speed memory locations that are in the CPU are called _____________

register

A program's instructions must be store in main memory before they can be executed.

true

All information that is to be processed by a computer must first be entered into memory via an input device.

true

If the computer is switched off, data in secondary storage is usually not lost.

true

Loading the operating system from disk into memory is called booting the computer.

true

One task of an operating system is to provide input and output facilities to a program.

true

Some files contain data for a program; others contain the program statements themselves.

true

User account codes are private property.

true

Code that is attached to another program that spread's through the computer's memory creating harm is called a(n) _______

virus

A(n) ___________ disrupts a computer network by replicating itself on other network computers.

worm


Set pelajaran terkait

Imaging I and II Final Study Guide (Registry)

View Set

Chapter 6 A&P Bones and Bone Structure

View Set

Science chapter 7 section review

View Set

Neurology - Spinal Cord Physiology

View Set

Squares, Square Roots, Cubes, and Cube Roots

View Set

Knowledge check: Databases and data

View Set

Physical Science: 5.07 Unit Test: Elements

View Set

ITEC 1001 Chapter 4: Networking and Immersive Reality

View Set

Introduction to the immune and lymphatic systems

View Set