CSCI Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

d. Nyquist rule

A digitization guideline which states that the sampling frequency should exceed the signal frequency by at least a multiple of two is the: a. Leibniz rule b. Analog-Digital rule c. Sample rate rule d. Nyquist rule

d. binary object file

A form of a program that is directly executable by a computer is a(n): a. device driver ffile b. high-level language file c. assembly file d. binary object file

b. provides guidelines for finding a solution

A heuristic process: a. is guaranteed to work 100% of the time b. provides guidelines for finding a solution c. yields the specified answer or reports back that no such answer exists d. All of these

b. 1/1,000,000,000th of a second

A nanosecond is: a. 1/1,000,000th of a second b. 1/1,000,000,000th of a second c. 1/100th of a second d. 1/1,000th of a second

Abstraction

A(n) abstraction is an idea or concept extracted from a specific situation.

d. brighten the image

Adding a positive number to each component of each pixel in an image will: a.improve the contrast of the image b. darken the image c. turn the image black d. brighten the image

b. various agents

Algorithms are used by: a. no one, they are just imagined solutions b. various agents c. only computers d. only web searches

d. use resources efficiently

Algorithms should: a. only be clear to the algorithm designer b. be ambiguous to allow creativity c. be written to solve one specific case d. use resources efficiently

Finiteness

An algorithm that has no successful end violates the _________ property.

b. a word that includes symbols or numbers to represent some letters

An example of a good password is: a. the user's birthday b. a word that includes symbols or numbers to represent some letters c. the user's nickname d. the user's pet's name

c. 212, 212, 212

Assume you have a scanned black and white photo and the subpixels had values of 195 each. You want the image's pixels to all be nearer intense white while keeping their relative relationships. Which of the following could the subpixels be changed to? a. 0, 0, 0 b. 179, 179, 179 c. 212, 212, 212 d. 0, 179, 212

b. get the sender's permission

Before forwarding email, you should: a. notify the sender that you are forwarding it b. get the sender's permission c. include a disclaimer d. All of these

d. sleep on it

Before sending or posting emotional content by email or online: a.send it to all the people you can think of who might be interested in your email b. remember that, since email is private, your thoughts will be secure c. send it quickly, before you change your mind d. sleep on it

b. four bytes long

Computer instructions are: a. one byte long b. four bytes long c. either bits long d. two bytes long

b. uses bits to represent both positive and negative values

Digitizing sound: a. achieves perfection using an unlimited number of bits b. uses bits to represent both positive and negative values c. is compressed using MPEG d. requires lossless compression techniques

b. is a lossless encoding scheme

GIF encoding: a. is used for photographs b. is a lossless encoding scheme c. was invented by the Joint Photographic Experts Group of the ISO d. can display 1024 different colors

a. use of the software

Generally speaking, a software license gives you: a. use of the software b. ownership of the software c. permission to resell the software d. all of these

d. The manufacturer uses techniques such as redundancy

How are hardware failures generally resolved? a. The manufacturer creates only unbreakable hardware b. The manufacturer tests using the specification c. The manufacturer employs a 24-hour support staff d. The manufacturer uses techniques such as redundancy

a. 16

How many bits does each hexadecimal digit require? a. 16 b. 2 c. 4 d. hex is not measured in bits

c. 8

How many characters are a good minimum length for a password? a. 6 b. 3 c. 8 d. 12

c. a few

How many instructions do computers know? a. a lot b. only one c. a few d. more than humans can count.

c. the same

If an algorithm is run at different times but with the same data the output will be: a. sometimes the same but not often b. different c. the same d. impossible to tell

c. Take a break and come back to try to solve the problem again later

If you have tried all the debugging steps you learned in this chapter and still can't fix the problem, what should you do before throwing up your hands in despair? a. Change to another computer b. Email your instructor and explain that you can't submit an assignment because your computer is broken. c. Take a break and come back to try to solve the problem again later d. Any of these

b. the Web Console

In Firefox, what tool can you use to see the errors on a web page? a. the Tech Support section b. the Web Console c. the Help menu d. Firefox has no such tool

d. the fact that the computer can refer to memory locations in any order

In Random Access Memory (RAM), what does the word "random" refer to? a. the fact that a request to memory might return the contents of any location b. the fact that memory units are unreliable and may return any value c. the fact that the amount of time required for the memory unit to respond is unknown ahead of time d. the fact that the computer can refer to memory locations in any order

d. fail-soft

In software, a program that continues to operate but with possibly degraded functionality is called: a. fault-tolerant b. fail-safe c. bug-safe d. fail-soft

c. fail-safe

In software, a program that stops operating to avoid harm is called: a. fail-soft b. bug-safe c. fail-safe d. fault-tolerant

c. loops

Instruction sequences that repeat are called: a. assumptions b. tests c. loops d. sorts

a. easy to forward

Most email is: a. east to forward b. subject to censorship c. copyrighted d. private

d. the infant mortality property

Most hardware failures caused by the manufacturing process show up after only a few hours of operation. This is known as: a. the early failure property b. the redundancy factor property c. the specification failure property d. the infant mortality property

b. allow several but not unlimited login attempts

Most login protocols: a. allow unlimited login attempts b. allow several but not unlimited login attempts c. shut off access after a single failed login attempt d. none of these

d. gigahertz

On the computer, one billion clock ticks per second is called a: a. nanohertz b. megahertz c. teragertz d. gigahertz

a. compiler

Software that translates a program written in a programming language into machine instructions is a(n): a. compiler b.browser c. driver d. algorithm

c. 5

The Hawaiian alphabet has 18 symbols. How many bits are needed to represent just these symbols? a. 16 b. 2 c. 5 d. 28

b. encodes letters as words

The NATO broadcast alphabet: a. is efficient in minimizing the amount of memory needed to store each letter b. encodes letters as words c. makes it difficult to distinguish between different letters d. encodes all digits using unusual names

b. is binary

The PandA system: a. contains gray b. is binary c. is formed from 256 letter representations d. has 10 digits

a. 5

The binary number 101 represents the decimal number: a. 5 b. 9 c. 3 d. 7

b. 001 1101 1100

The decimal number 174 is equivalent to binary: a. 1101 1010 b. 001 1101 1100 c. 1110 1111 d. 1010 1110

a. so the reader can tell whether or not the product is upside down

The familiar UPC bar code uses more than the minimum number of bits to code symbols: a. so the reader can tell whether or not the product is upside down b. so additional information can be coded c. so the code will fill up the required amount of space on the package d. to allow for expansion in the future

c. control unit

The hardware implementation of the Fetch/Execute Cycle is the: a. RAM b. peripheral c. control unit d. more input/output (I/O) ports

a. assembly

The lowest level programming language that humans use is: a. assembly b. C# c. Java d. binary

d. the interpretation placed on them by computer programs

The meaning of bits depends on: a. the principles applied by the transmission medium b. the ability to perform analog-to-digital conversion c. their inherent meaning d. the interpretation placed on them by computer programs

b. from a Monty Python skit

The origin of the word "spam" (used to describe junk email) is believed to be: a. unknown b. from a Monty Python skit c. a shortened form of the phrase "spurious messages" d. the nickname of a small town in Russia

c. 7-bit code

The original version of ASCII used: a. 4-bit code b. 8-bit code c. 7-bit code d. 16-bit code

b. hard disk

The peripheral used for both input and output is the: a. printer b. hard disk c. keyboard d. mouse

b. next instruction to be executed

The program counter keeps track of the: a. number of programs the computer is running b. next instruction to be executed c. number of memory addresses used d. current instruction in the Fetch/Execute step

c. sample rate

The quality of a sound recording is determined by the ________ and the sample precision. a. notification rate b. bit width c. sample rate d. sample speed

c. Web Console

To assist with HTML debugging, errors discovered by Firefox while rendering a page can be viewed by going to the: a. HTML Compiler b. HTML Debugger c. Web Console d. Diagnostic Analyzer

a. reCaptcha

To search for a word in a picture, pixels must be converted to: a. reCaptcha b. text c. analog d. bits

False

True or False: A bit is larger than a byte.

False

True or False: A heuristic process is an example of an algorithm.

True

True or False: A key property of the Presence and Absence (PandA) representation is that it is discrete. Either a phenomenon is present or it is not; either the logic is true or false.

False

True or False: A red, yellow, and green traffic light is a good example of a binary system.a. 5

False

True or False: Algorithms are only used in the field of computers; there is no use for algorithms anywhere else.

True

True or False: An algorithm is a systematic method to produce a specified result.

True

True or False: Blocks of four bytes are called words.

True

True or False: Debugging principles are not limited to use by IT professionals.

True

True or False: Debugging relies on logical reasoning and is learned by experience.

True

True or False: Digitizing a sound wave requires that the analog wave be converted to bits.

False

True or False: Each pixel on a computer display is formed from red, yellow, and blue colored lights.

False

True or False: Email backlogs should be answered in the order in which they were received.

False

True or False: Every memory location in the computer is numbered, starting with 0.

False

True or False: Extended ASCII is a 9-bit code.

False

True or False: Higher bandwidth usually means higher latency.

True

True or False: If your computer is not working, most likely it is your fault.

True

True or False: If your software is acting strange or your computer is behaving in a manner that seems unusual, you might have a computer virus.

True

True or False: In modern computer memory, each location is normally composed of one byte.

False

True or False: It is legal to give commercial software to your friends but not to sell it.

True

True or False: It is practically impossible to have 100% bug-free software.

True

True or False: It requires three bytes to represent the color of a single pixel.

True

True or False: Memory has a finite capacity.

False

True or False: Most email in the United States is a private conversation between the sender and the recipient.

True

True or False: Often fixing one error can reveal other errors you didn't realize were present.

False

True or False: One-way ciphers are reversible; they can be decoded.

True

True or False: RGB, the name for a color encoding method, is an acronym for Red, Green, Blue.

True

True or False: Running a program with the exact same data produces exactly the same results every time.

False

True or False: The ADD instruction adds the address numbers of the memory locations associated with the two values to be added.

True

True or False: The PandA unit is known as a bit.

True

True or False: The byte is the standard unit for computer memory.

False

True or False: The first step to take when debugging is to call tech support.

True

True or False: The sequence of commands is important in an algorithm.

True

True or False: The type of data, the mount of data, and the form of the data must all be specified when creating an algorithm.

False

True or False: The word netiquette refers exclusively to email etiquette.

False

True or False: There is only one possible algorithm that can be developed to solve each problem.

True

True or False: To play a digitized sound, the numbers are read from memory into a digital-to-analog converter (DAC) which creates an electrical wave that is input to a speaker.

False

True or False: Web pages cannot be copyrighted.

True

True or False: When you reply to an email, it is best to include the context of the message you are replying to.

d. include a ninth bit, set to 0

Using even parity, a normal byte, such as 1010 0011, would: a. use a ninth bit to determine which bit was changed if an error occurs b.include a ninth bit, set to 1 c. not use a ninth bit d. include a ninth bit, set to 0

c. American Standard Code for Information Interchange

What does ASCII stand for? a. Aspiring Students Confused by Incoherent Incantations b. Algorithmic Sequence of Computer Integrated Information c. American Standard Code for Information Interchange d. All Standards Complete Initialization Interface

b. checking that the error is reproducible

What is the first step in the debugging process? a. checking obvious error sources b. checking that the error is reproducible c. generating a theory to explain the problem d. isolating the problem

b. save your work with a new file name, exit, and restart

When you are working in a software program and it starts acting strange, you should: a. do nothing since minor glitches happen all the time b. save your work with a new file name, exit, and restart c. reinstall the software program d. immediately shut down the computer

c. Google

Which of the following is NOT an example of crowdsourcing? a. Freerice b. Foldit c. Google d. Be a Martian project

a. Add 1 to the total number of students registered

Which of the following is a good example of the effectiveness property of algorithms? a. Add 1 to the total number of students registered b. Enter the test score you may get on the next test c. Subtract the amount spilled from a glass of juice d. Any of these are good examples

d. Add values A and B, then divide by C. If C = 0, solution is "undefined."

Which of the following is an example of definiteness? a. Divide the result of values A and B by D b. Add and multiply values A, B, and C c. Use multiplication and addition to find the result of three values d. Add values A and B, then divide by C. If C = 0, solutions is "undefined."

d. You buy one copy of a computer game and install it on your laptop and your desktop computer.

Which of the following is probably legal? a. You buy a computer game and make copies for your friends b. You buy one copy of a computer game and install it on you laptop, your brother's laptop, and your computer at work c. You and your friends pool your money to buy a computer game and then share it by making copies for each of you d. You buy one copy of a computer game and install it on your laptop and your desktop computer

a. add two numbers together

Which of the following might be a single machine instruction? a. add two numbers together b. convert a decimal number to binary c. send a file to the printer d. request a new web page from a browser

c. OCR systems can easily interpret words created by reCaptcha

Which of the following statements id NOT correct? a. OCR's business applications include sorting mail and banking b. OCR can be used to read the handwritten digits on checks c. OCR systems can easily interpret words created by reCaptcha d. OCR is a very sophisticated technology

d. All of these are true

Which of the following statements is NOT true about algorithms? a. Problems can be solved by different algorithms in different ways b. Algorithms can be given at different levels of detail, depending on the abilities of the agent c. Algorithms always work d. All of these are true

b. phishing

You receive an email from your bank informing you that they are performing an audit and have found a problem with your account. They ask you in to help resolve the problem. This is an example of: a. spam b. phishing c. a legitimate email d. an advance-fee fraud

c. Parity

________ refers to whether a number is even or odd. a. The binary system b. PandA c. Parity d. The place system


Set pelajaran terkait

Chapter 1 Business Communication in the Digital age

View Set

United States Government & Politics Practice

View Set

Chapter 16 Therapy and Treatment

View Set

Digital Cloud Leader Google form practice test

View Set

Chapter 14 Activities, Media, and the Natural World

View Set

Apply knowledge of muscle anatomy and physiology

View Set