CSI101 chapter 1, CSI101 chapter 12, CSI101 chapter 9, CSI101 chapter 5, CSI101 chapter 7, CSI101 chapter 2, CSI101 chapter 6, CSI101 chapter 14, CSI101 chapter 8, CSI101 chapter 11, CSI101 chapter 3, CSI101 chapter 13, CSI101 chapter 10, CSI101 chap...

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

F

As the resolution numbers get larger for a monitor, the size of each pixel gets larger.

F

A CD can store approximately 700 KB of data.

F

A DBMS delegates the task of ensuring data integrity to the operating system

Query

A DBMS must provide or interface with a(n) _____ language to extract information from the database. a. assembly c. machine b. Query d. natural

T

A URL consists of the domain name followed by specific folder and/or filenames.

T

A Web service is a server-based Web program that contains data to be used by other programs or Web pages

bit

A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off). a. nibble c. byte b. word d. bit

database

A ____ is a collection of information usually organized into tables. a. browser c. database b. multiplex d. publisher

text editor

A ____ is a generic tool that allows you to do basic editing, although the finished document won't have a professional look. a. word processor c. GUI b. text editor d. spreadsheet

byte

A ____ is a group of eight bits. a. byte c. nibble b. word d. blip

discriminant

A ____ is identified by the number of digits a numbering system has, including zero. a. root c. determinant b. discriminant d. base

pixel

A ____ is the smallest unit that can be displayed on a computer monitor. a. micron c. twip b. picon d. pixel

presentation

A ____ tool is the most logical choice for the development of a slide show. a. spreadsheet c. word processing b. presentation d. scheduling

Firewall

A _____ is a device designed to protect an internal network or node from intentional or unintentional damage from an external network. a. gate c. firewall b. barricade d. fence

LAN

A _____ is a relatively small number of computers connected together in close proximity, usually within a building or complex. a. LAN c. DAN b. WAN d. MAN

table

A _____ or entity is divided into rows or columns much like a spreadsheet. a. box c. chart b. grid d. table

tree

A _____ represents a hierarchical structure similar to that of organizational or genealogy charts. a. grid c. digraph b. network d. tree

three

A binary search tree contains _____ components. a. two c. four b. three d. eight

F

A bit can represent four values.

F

A capacitor consists of three parts, an emitter, a collector, and a base

F

A class diagram shows an object's particular state at any given time.

T

A collection of columns referring to one item is called a row or tuple

F

A component diagram depicts the physical architecture of a computer-based system.

T

A demilitarized zone is a location outside the firewall that is more vulnerable to attack from outside.

F

A digital certificate is a string of bits used in an encryption algorithm to encrypt or decrypt data.

T

A firewall is software or hardware that acts as a protective filter between an internal computer system and an external network such as the Internet.

F

A function is a received value assigned to a variable that is used by a block of code.

truth

A gate's output for any set of inputs follows the specifications given in the ____ table. a. variable c. log b. data d. truth

spreadsheet

A grid-like document that facilitates arithmetic manipulation and presentation is called a ____. a. resume c. memo b. fax d. spreadsheet

F

A hard disk is a sequential access device

T

A hard disk is the most common place to store files

composite

A key that is made up of more than one column is called which of the following? a. joined c. aggregate b. union d. composite

F

A linked list stores data contiguously.

Structured Query Language

A special language known as _____ is used to query or extract information from databases. a. Selection Quotation Language c. Structured Query Language b. Sorting Questions Language d. Software Questioning Language

F

A modification attack denies legitimate users from using the system or from gaining access to information.

F

A modification attack is a trap laid by a system administrator to catch and track intruders.

T

A multi-dimensional array consists of two or more single-dimensional arrays

digital video recorder

A specialized computer designed to record and play back video content from cable and satellite sources is called a(n) ____. a. expert system c. quantum computer b. digital video recorder d. robot

pointer

A stack _____ keeps track of the top of a stack. a. sentinel c. marker b. flag d. pointer

T

A stack is a last in, first out (LIFO) data structure

T

A stack is a special form of a list that allows operations such as "push" and "pop".

T

A parent class is a generic class from which other classes can be created through the process of inheritance.

process

A program that is currently executing is called a ____. a. code segment c. JCL b. process d. regular routine

F

A qubit can only represent two values.

F

A queue is another type of linked list that implements a LIFO storage system

T

A reserved word has a special instructional meaning.

T

A scalable system allows a company to add components as business and computing needs increase.

deadlock

A situation known as ____ occurs when all active processes are tied up in a circular wait for resources. a. synchronization c. safe mode b. context switch d. deadlock

frequency

A sound consists of a waveform that has amplitude (volume) and a ____ (pitch). a. frequency c. phase angle b. phase shift d. period

F

A text editor is just another term for a multifunction word processor

F

A trade secret is a government grant that gives the sole right to make, use, and sell an invention for a specified period of time.

F

A truth table with two inputs would have two rows.

T

A user-friendly programmer's workspace is a high-level analogy for an Integrated Development Environment (IDE).

T

A variety of graphical formats supports the variety of images available on the Internet.

F

A word processor is not the tool of choice for memo design and creation

directed hacker

A(n) ____ is generally a cracker motivated by greed and/or politics. a. undirected hacker c. Trojan horse b. script kiddies d. directed hacker

cluster

A(n) ____ contains a group of the smallest units that can be accessed on a disk. a. cluster c. NTFS b. file system d. FAT

activity

A(n) ____ diagram shows the events that occur within a use case or within an object's behavior. a. class c. collaboration b. activity d. use case

proxy

A(n) ____ firewall establishes a new link between each packet of information and its destination. a. proxy c. biometric b. digital d. packet-filtering

program

A(n) ____ is a collection of statements or steps that solve a problem and need to be converted into a language that the computer understands in order to perform one or more tasks. a. Algorithm c. program b. Identifier d. parameter

flowchart

A(n) ____ is a combination of symbols and text that provide a visual description of a process. a. class c. object b. flowchart d. component

expert system

A(n) ____ is a computer program that simulates the judgement and behavior of a human or an organization that has expert knowledge and experience in a particular field. a. flash memory c. expert system b. neural network d. USB drive

undirected hacker

A(n) ____ is a cracker motivated by the challenge of breaking into a system. a. script kiddie c. undirected hacker b. Trojan horse d. directed hacker

volume

A(n) ____ is a drive or partition on a drive that is formatted with a file system. a. hash algorithm c. hash key b. CPU d. volume

Algorithm

A(n) ____ is a logically ordered set of statements used to solve a problem. a. Identifier c. variable b. Algorithm d. parameter

Interpreter

A(n) ____ is a program included with an executable application that acts as the translator between the program and the computer by converting program statements one by one into a language the computer understands. a. IDE c. constructor b. interpreter d. endless loop

compiler

A(n) ____ is a program that reads all statements from a program and converts them into a computer language. a. event c. compiler b. object d. control structure

high-level language

A(n) ____ is a programming language that is more human-friendly or more natural for humans to read. a. assembly language c. high-level language b. machine language d. interpreter

low-level language

A(n) ____ is a programming language that resembles more what a computer can understand rather than a human a. low-level language c. event handler b. high-level language d. postcondition loop

object

A(n) ____ is a self-contained entity that consists of both data and procedures. a. constructor c. object b. method d. parameter

sniffer

A(n) ____ is a software program that allows the user to listen in on network traffic. a. Trojan horse c. worm b. sniffer d. honey pot

bot

A(n) ____ is a software program that can roam the Internet autonomously. a. cookie c. honey pot b. digital certificate d. bot

constructor

A(n) ____ is a special class function/method used for creating or instantiating an object. a. event handler c. expression b. constructor d. function

prototype

A(n) ____ is a standard or typical example that gives the end user a good idea of what they will see when their application is completed. a. flowchart c. data dictionary b. prototype d. design document

declaration

A(n) ____ is a statement that associates an identifier with a variable. a. attribute c. variable b. endless loop d. declaration

file

A(n) ____ is a storage location that contains data that is treated as either binary or text. a. cluster c. file b. overflow area d. hash key

Class

A(n) ____ is a template or mold used for defining new object types along with their properties and behavior. a. compiler c. method b. event d. class

paradigm

A(n) ____ is a theoretical framework, or a way of doing things. a. expert system c. polymer b. paradigm d. MRAM

hash key

A(n) ____ is a unique value used in hashing algorithms. a. hash key c. directory b. cluster d. overflow area

event

A(n) ____ is an action or occurrence that is recognized by a class. a. identifier c. variable b. event d. scope

script kiddie

A(n) ____ is an amateur hacker that simply uses the hacking tools that have been developed by others. a. cracker c. script kiddie b. reverse engineer d. Trojan horse

virus

A(n) ____ is an uninvited guest program on your computer with the potential to damage files and the operating system. a. proxy firewall c. virus b. sniffer d. DMZ

cracker

A(n) ____ is an unwelcome system intruder with malicious intent. a. honey pot c. cracker b. software engineer d. spammer

threat

A(n) ____ is characterized by three things: targets that might be attacked, agents or attackers, and events. a. risk c. copyright b. callback d. threat

T

An advantage of relative file access is that records can be updated in place

file system

A(n) ____ is the part of the operating system responsible for creating, manipulating, renaming, copying, and removing files to and from storage devices. a. cluster c. overflow area b. file system d. hash key

Distributed

A(n) ____ network consists of computers that independently decide how to channel to the next computer. a. concentrated c. monolithic b. distributed d. centralized

buffer overflow

A(n) ____ occurs when a program tries to place more information into a memory location than it can handle. a. access attack c. virus attack b. buffer overflow d. modification attack

assembler

A(n) ____ reads assembly language code and converts it into machine language. a. control structure c. event handler b. assembler d. identifier

assembly language

A(n) ____ resides between the lowest-level language and a higher-level language; it assigns letter codes to each machine language instruction. a. machine language c. class b. constructor d. assembly language

relationship

A(n) _____ defines how one entity works with or relates to another. a. connection c. relationship b. arrangement d. union

transitive

A(n) _____ dependency exists when one column is dependent upon another column that is not the primary key. a. transitive c. relational b. dysfunctional d. associative

timing

A(n) _____ diagram shows the protocol interactions between two entities. a. flow c. timing b. assignment d. hierarchy

pointer

A(n) _____ is a memory cell that contains the address of another memory cell as its data. a. index c. pointer b. token d. element

Protocol

A(n) _____ is a set of rules designed to facilitate communication. a. procedure c. code b. accord d. Protocol

index

A(n) _____ is a special type of file that occupies its own space and specifies one or more columns that determine how the information stored in a table is organized. a. field c. tab b. identifier d. index

foreign

A(n) _____ key is defined as a column in one table that is part of the primary key in another. a. composite c. auxiliary b. secondary d. foreign

T

ARPA was created by Eisenhower as a direct response to the possible threat posed by the Russian launch of Sputnik.

the Hacker's Manifesto

An anonymous document that justifies cracking into a systems as an ethical exercise is called ____. a. spyware c. the cracker bible b. the Hacker's Manifesto d. Phreaker's Way

T

As expected, the term freeware implies software available free of charge

IBM

According to general consensus, which of the following companies won the mainframe battle of the first electronic computer generation? a. IBM c. Honeywell b. Remington Rand d. RCA

21

According to positional value, the binary number 101012 represents ____ things. a. 3 c. 12 b. 5 d. 21

F

Accountability involves making systems on which information sits accessible and useful to those who should use them.

F

Applications cannot be designed to run on multiple platforms.

F

All files are stored as text files

4

An 8-nibble word is more likely to be referred to as the equivalent ____-byte word. a. 2 c. 8 b. 4 d. 16

T

An Acceptable Use Policy defines who can use the company computers and networks, when, and how.

T

An OS can reside on a ROM chip.

F

An advantage of FAT is that overall performance increases as more files are stored on the partition

Overflow area

An area in a file that is used in case a collision occurs during the hashing algorithm is called a(n) ____. a. cluster c. reserved area b. overflow area d. random area

F

An attribute is also called a relation.

T

An element is another name for a memory cell in an array

F

An example of a good password is: iopwmc.

T

An example of a sequential file might be an audio file or video file

T

An expression is a programming statement that returns a value when executed.

T

An important reason for using a design document is that it can serve as a blueprint.

T

Animation and interactivity tend to increase user interest in a Web site

T

Application programs are geared toward an end user rather than the programmer.

one-to-one

Assembly language, while easier to use than machine code, has what type of correspondence with machine code? a. many-to-one c. one-to-one b. many-to-many d. one-to-many

T

Assembly statements are read from right to left

variable initialization

Assigning a value to a variable at declaration is called ____. a. startup c. concatenation b. variable initialization d. shortcut notation

Fetch-execute

At a basic level, most computers operate on what is called a(n) "____" cycle. a. encrypt-encapsulate c. store-revise b. edit-add d. fetch-execute

2 GB

At present, flash memories come in sizes up to ____. a. 1 MB c. 2 GB b. 100 MB d. 4 TB

stack

Backtracking is most efficiently accomplished by using a(n) _____. a. stack c. tree b. queue d. array

Linux

Based on low cost, available source code, and reputed reliability, which of the following operating systems presents the greatest competitive threat to Windows? a. Crescent c. Linux b. Star d. OS/2

F

Based on the following code fragment, the value of iResult is 4. int iFirstNum = 15; int iSecondNum = 10; int iResult = 0; int iResult = IFirstNum % iSecondNum;

F

Because computer scientists focus on program design, there is really no need for them to acquire proficiency in performing Office tasks.

T

Bits of code that uniquely identify a particular virus is called a virus signature.

stored program

Both the Jacquard loom and the player piano had a "____". a. stored program c. disk drive b. monitor d. keyboard

F

Bus wires in the system category are responsible for timing signals and other protocols.

F

By default, the SELECT statement returns data in no particular order.

transistor

By switching on and off, the ____ can be used to represent the 1s and 0s that are the foundation of all that goes on in the computer. a. capacitor c. resistor b. transistor d. inductor

F

CRT displays are much thinner and run much cooler than LCD monitors.

42 Mbps

Cable is theoretically capable of speeds up to _____. a. 4.2 Mbps c. 420 Mbps b. 42 Mbps d. 42 Gbps

address

Central to the operation of the IP protocol is the IP _____ of both the source and destination. a. name c. signifier b. location d. address

T

Charles Babbage managed to design a machine that captured the key working elements of the modern electronic computer

T

Cookies are related to and sometimes used in conjunction with spyware, but considered different because the user is assumed to be aware of their use.

allocation units

Clusters are also called ____. a. directories c. algorithms b. allocation units d. overflow areas

F

Code cannot be automatically generated by object-oriented programs

malicious code

Code designed to breach your system security and threaten your digital information is known as ____. a. malicious code c. honey pots b. digital certificates d. patents

F

Compression algorithms can be easily converted into computer programs

F

Computer scientists rarely use e-mail to share files

F

Computer scientists will never find occasion to use spreadsheet technologies

T

Computers and the Internet are changing the face of nearly every industry.

command

Console operating systems prompt users to interact through a(n) ____ line. a. operational c. programming b. flow d. command

F

Control wires contain the binary data that is being read from or written to memory and I/0.

T

Copyright protects the expression of the idea and not the idea itself.

hacktivism

Cracking into a system as a political act is known as ____. a. hacktivism c. social engineering b. repudiation d. phreaking

spider

Crawling makes use of a special program called a bot or _____. a. bug c. spider b. butterfly d. centipede

office

Creating documents, presentations, and spreadsheets are best classified as ____ tasks. a. programming c. scientific b. Internet d. office

T

Current hard disk technology allows for hard drives with over 500 GB of capacity.

F

DISPLAY is a DOS command that lists the files in a specified directory or subdirectory.

F

DOS and UNIX allow for recovery of folders and files after they have been deleted

F

DOS has a limitation of 255 characters for the name of a folder.

F

DVDs can store from 4.7 MB to 17 MB of data.

T

DVDs have high densities and can store information in multiple layers and on multiple sides of the platter

compression

Data ____can be used to reduce the sizeof a file and speed thetransmission ofthe file through e-mail. a. collaboration c. inlining b. design d. compression

T

Data structures organize the data in a computer

database

Data that has been organized and logically related to allow access, retrieval, and use of that data is called a _____. a. store c. field b. database d. record

F

Deadlock issues are resolved without the intervention of the operating system.

T

Decoder circuits perform functions such as addressing memory and selecting input or output devices.

hexadecimal

Displays containing the contents of a computer's memory or the hard disk are often referred to as ____ memory dumps. a. error c. decimal b. hexadecimal d. octal

WLAN

Fiberoptics and wireless technologies have given rise to which of the following terms? a. WAN c. WLAN b. Internet d. LAN

logical

ENIAC was a functioning and useful computer that could perform both arithmetic and ____ operations. a. standard c. linguistic b. surgical d. logical

F

Each gate in a circuit reacts in a completely unpredictable way

4

Each hexadecimal digit relates directly to a ____-bit binary pattern. a. 2 c. 8 b. 4 d. 16

T

Each physical device connected to a network must have a network interface card (NIC).

T

Each position in the tree is called a node or vertex.

streaming video

Effort is ongoing to make ____ available on cell phones. a. HDTV c. VCRs b. streaming audio d. streaming video

T

Encapsulation is the process of hiding an object's operations from other objects.

Transfer

File ____ Protocol (or FTP) is a transmission method used to send files across the Internet. a. Task c. Transfer b. Test d. Table

F

Every computer game, program, picture, or sound is stored in the computer as a series of decimal digits.

T

Every multipurpose device with a CPU must also have an operating system.

F

FAT has a larger overhead than NTFS

T

Files may be viewed as leaves or nodes on a tree-like structure.

F

FTP is the protocol that allows Web browsers and Web servers to talk to each other

T

FTP transmission methods are appropriate for placing files in a common location so that many users can download and have access to them.

F

Fast Ethernet speeds do not exceed 10 Mbps.

F

Fiber-optic cables are much more susceptible to attenuation than copper cables

glass

Fiber-optic cables use _____ fibers to guide light pulses along a cable. a. ceramic c. plastic b. glass d. tungsten

T

Flash memory is nonvolatile.

F

Flowcharting is best described as an Internet related task related to surfing.

F

Folders may not contain folders.

T

For any quantity, there is a number in any base to represent it.

T

Formatting can be used to create boot disks.

F

From a database point of view, first normal form is better than second normal form

T

Given the appropriate tool, nearly any user can generate graphical content

word processor

Grammar check and font selection are common features of which of the following tools? a. browser c. binder b. text editor d. word processor

shareware

Graphics software available in the form of ____ is generally free of charge during a trial period. a. adware c. shareware b. middleware d. malware

hyperlinks

HTML and the Web connect one page to another through _____. a. overlinks c. hyperlinks b. higherjoins d. cyberbridges

F

HTML deals with both the form and content of a Web page.

T

HTML is not case sensitive

T

Half of a byte is sometimes referred to as a nibble.

dequeue

In order to remove an item from a queue, you would use a _____ operation. a. enqueue c. requeue b. dequeue d. delete

magnetic

Hard disks are made up of one or more metal platters with a coating consisting of ____ particles. a. magnetic c. photonic b. atomic d. silicon

F

Having a signature in the design document does not mean that it can be used as a contract.

F

Head pointers are data types associated with static arrays.

punch cards

Herman Hollerith introduced electromechanical counting equipment using ____ as input. a. voice patterns c. magnetic tape b. punch cards d. keyboard entry

T

Hexadecimal numbers are used as a shorthand method to represent binary values.

F

High-level protocols such as HTTP and FTP can only be used in the Internet environment.

Internet Explorer

In its antitrust suit with the government, Microsoft claimed which of the following programs was an integral part of the operating system? a. Mosaic c. Navigator b. Internet Explorer d. MS-Word

learn

In order for a computer to emulate human behavior and reasoning, it needs to have the ability to ____. a. walk c. learn b. talk d. hear

F

IBM built the first electronic computer

T

IBM chose Microsoft to develop its PC operating system.

F

IBM preferred selling its PC through an established commercial sales force rather than retail outlets.

Mark I

IBM's first multipurpose machine was called which of the following? a. UNIVAC c. Mark I b. EDVAC d. ENIAC

T

If a user seeks a document tool with the most extensive formatting and graphics capabilities, he/she is best advised to consider a word processor over a generic text editor.

F

If your hard disk is 10GB or less then you may want to use NTFS because it is more efficient in handling smaller volumes of data

lossless

Images reduced by ____ compression techniques retain their original quality. a. lackless c. sassy b. lossless d. glossy

T

Impedance makes the electrical signals weaken as they travel along the wire.

F

In order to get a head start, you should always begin writing source code while seeking project specification approval

Charles Babbage

In 1823 ____ invented a mechanical device that did addition, subtraction, multiplication, and division of 6-digit numbers. a. Gottfried Leibniz c. Charles Babbage b. Blaise Pascal d. Thomas Jefferson

Apple II

In 1977, Apple released the ____ based upon the Motorola 6502 processor. a. Apple I c. Macintosh b. Apple II d. iPod

F

In 1998, Netscape repudiated the open source movement, and suppressed the source code for its browser

HELP

In DOS, you can enter ____ <command> to get more details concerning a particular command. a. HELP c. ASSIST b. AID d. SUPPORT

F

In Java, you cannot associate a number with a boolean value.

man

In Unix or Linux, entering ____<command> gives you the manual on the command that you specify. a. MAN c. HELP b. man d. help

slide rule

In Western society, you can probably credit the 1622 invention of the ____as the beginning of the solution of complex mathematical problems by mechanical devices with moving parts. a. abacus c. logarithm b. slide rule d. transit

Recycle

In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied. a. Remainder c. Recycle b. Refuse d. Recovery

star

In a _____ topology, one of the computers or a network device serves as a hub for all messages. a. grid c. bus b. star d. ring

F

In a binary tree, the left node always has a value greater than the right node

lossy

In addition to redundant areas, ____ compression techniques eliminate information not perceptible to the human eye. a. lossless c. lossy b. primary d. secondary

algorithm

In order to sort data you first need to create a(n) _____ that defines the process for sorting. a. list c. stack b. queue d. algorithm

T

In relation to refining searches, the keyword AND indicates that all criteria must be met.

mantissa

In scientific notation, the method of displaying numbers uses a(n) ____ and an exponent. a. mantissa c. abscissa b. asymptote d. ordinate

F

In the 1980s Microsoft refused to write application software for Apple.

build and fix

In the ____ model of software development, the developer writes a program and continues to modify it until the system is functional. a. rapid prototype c. waterfall b. incremental d. build and fix

waterfall

In the ____ model of software development, the fundamental processes involved in creating the program are represented as phases. The output from each phase is used as the input to the next phase. a. build and fix c. rapid prototyping b. waterfall d. spiral

F

In the adder, the bits are added according to the rules of the hexadecimal numbering system.

F

In the common monitor resolution specified as 1024 X 768, the number 1024 represents rows and 768 represents dots (or pixels).

F

In the context of databases, a column represents a record of information

new

In the context of the Java programming language, the "_____" keyword tells the computer that a new array is being created. a. invoke c. new b. allocate d. make

object-oriented programming

In the fifth generation of electronic computing, modular approaches to coding, such as ____ , facilitate larger, more complex, and more quickly and reliably delivered software products. a. assembly programming b. machine programming c. object-oriented programming d. binary programming

F

Increasing the CPU clock speed by a given amount always results in a proportional overall speed increase in the computer.

F

Indexes do not require additional storage space in the database.

F

Input and output devices increase the speed of the typical computer.

F

Insertions are made at the front of the queue

T

Interaction with an FTP Web site is similar to interaction with a network drive

drivers

Interface programs that allow a computer to interact with peripheral devices are called ____. a. shell scripts c. drivers b. applets d. monitors

T

Interrupt handling is a much more efficient method for processing I/0 than polling.

F

It is always a good idea to use the switch statement when comparing string data types.

F

It is not possible to learn to program or to manage a database without understanding binary and hexadecimal number systems.

F

It is not theoretically possible for each of the programs or processes running on a computer to directly access I/O devices.

T

It is possible, but generally not desirable, to define a database using unnormalized tables.

10,000

It is thought that each neuron in the brain may have as many as connections to adjacent neurons. a. 10 c. 10,000 b. 100 d. 1,000,000

T

Java implements the selection control structure through the use of the if, if-else, if-else-if, and switch statements.

port

Keyboards, and most other I/O devices, connect to the motherboard through a(n) ____. a. socket c. channel b. adapter d. port

T

Layers in the OSI model are designed independently of the others

F

Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc

F

Microsoft Project software makes the job of project manager obsolete

F

Modern computers are capable of storing hexadecimal information.

software evolution

Modifying or changing the software to meet changing customer needs is called ____. a. software evolution c. rapid prototyping b. software modification d. incremental development

Von Neumann

Most computers today are still based on what has come to be called ____ architecture, and are sometimes still called ____ machines. a. Hilbert c. Von Neumann b. Turing d. Non Von

F

Most consumers asserted that the user-interface to DOS was intuitive

copying

Moving files is similar to ____ files. a. deleting c. copying b. closing d. opening

T

Moving parts are prone to mechanical failure.

F

Once a table is in the second normal form, it has for the most part been accurately defined

T

Once you have determined that a database is needed, you should create a data dictionary.

T

NTFS is geared toward a networked environment

F

Negative fractional numbers cannot be internally represented in a computer.

T

Negative powers are used to represent the fractional portion of numbers.

T

One common technique to avoid scope creep is to use a phased approach to software development.

frequency

Normal telephone voice-grade lines use what is called _____-division multiplexing to divide up the bandwidth among the subscribers. a. phase c. wave b. frequency d. amplitude

F

Normally, HTML pages are dynamic; they change from one request to another.

F

One of the main disadvantages of NTFS is the lack of security

ALU

One of the main functions of the ____ component of the computer's CPU is to add numbers. a. controller c. memory b. ALU d. register

T

One of the main rules of software engineering is that you should document the information that clients give you. T

F

One of the problems with MRAM is its high power requirement to read and write data.

T

One of the rules of software engineering is that you should let the user help you design the screens.

T

One rule of software engineering is that you should be realistic when defining project completion dates.

F

One-to-one relationships are never appropriate.

T

Only 10 percent of the software running on all the computing devices of the world comes from Microsoft

T

Operating systems are responsible for the protection of memory and other resources

T

Optical storage is more stable than magnetic storage and is unaffected by outside magnetic influences.

T

Plug and Play technologies automatically detect and configure I/O devices.

F

Polymer memory can hold at most 100 CDs worth of music.

T

Prototype biological computers can perform operations at the rate of approximately one billion per second, which is comparable to the speed of the Pentium 2.4 GHz CPU

resolution

Printers are rated by both printing speed.and ____ of output. a. definition c. size b. variety d. resolution

random

RAM is called "____" because it does not have to be read sequentially. a. relative c. remedial b. random d. rapid

T

ROM (read-only memory) is not erased when the computer power goes off.

T

Raw audio samples are stored in files such as WAV files.

semicolon

SQL statements are closed with a(n) _____. a. Colon c. period b. semicolon d. exclamation mark

F

Repeaters alter the content of the data in the signals that they boost.

F

Repudiation is the science that studies the relationship between people and machines.

F

Researching the benefits and features of the various software tools involves a one-time investment of time and energy

F

SQL syntax requires the WHERE clause to precede the keyword FROM

T

Reverse engineering occurs when someone tries to figure out the design of a program or device by "taking it apart" and analyzing individual components.

T

Risk is the relationship between vulnerability and threat.

F

Routers check that the data received in the packet is identical to the data that was sent.

F

SQL commands may not be lowercase.

T

SQL sends only the data you want to view.

T

SMTP and FTP are two protocols involved with the Internet

F

Search engines use one main method to build a database of Web sites.

F

Shifting the starting point of an audio waveform is known as frequency modulation.

F

Signed and unsigned numbers in the computer are designed to always take up a different number of bits.

Time to live

So that packets do not keep bouncing from router to router forever, one of the fields in the IP header is the _____ field. a. time to live c. lifetime b. time to expire d. expiration

T

Software can be modified to meet the changing needs of the end user.

NOT

The ____ operator works with a single input and its purpose is to reverse the input. a. XOR c. AND b. NOT d. OR

data dictionary

Software engineers and end users can both use the ____ to achieve a clearer understanding of the data available for use in reports, screens, file transfers, and other data operations. a. data dictionary c. sequence diagram b. class diagram d. use case

T

Some types of polymer memory can only be written once, while others can be rewritten many thousands of times.

T

Sounds are stored in the computer in a manner very similar to images.

T

Spam is the name for an unsolicited e-mail.

T

Spiral prototyping starts with an initial pass using the waterfall model.

F

Stacks are typically used to organize requests to print documents.

T

Stacks, like linked lists and arrays, are just memory locations organized into process friendly structures

SMTP

The _____ protocol establishes a link from an e-mail client to a mail server. a. SMTP c. IMAP b. POP3 d. HTTP

mask

Subnets are defined through the use of a subnet _____. a. filter c. sentinel b. screen d. mask

Session

TCP and IP protocols map to Transport, Network, and _____ layers of the OSI model. a. Presentation c. Data Link b. Application d. Session

T

Table look-ups can be used to convert a number from one base to another.

T

The order of the fields does not have to match that of the defined table structure.

expert systems

Telephone support and hot lines, such as a poison control center, can make use of ____. a. expert systems c. SDRAM b. MRAM d. ROM

software validation

Testing software to ensure that it meets the software specifications is called ____. a. scope creep c. rapid prototype b. software validation d. incremental development

Integrated Development Environment

Text editors, compilers, and debuggers are directly featured on the menu of which of the following software tools? a. Integrated Development Environment b. word processor c. spreadsheet d. desktop publisher

T

Text files consist of ASCII or Unicode characters

24

The 16.7 million color palette of the BMP format requires ____ bits. a. 16 c. 24 b. 20 d. 32

T

The 192.168 subnet is never presented to the outside Internet

one

The AND circuit generates ____ output for each set of inputs. a. one c. three b. two d. four

F

The AND operator has an output of 1 (true) only if both inputs are 0

F

The Altair bus evolved into a specialized device that only a few hardware/software companies could use

T

The Apple II gained broad acceptance due to the ease with which programmers could write applications for it

T

The Boolean OR operator returns a 1 only when either or both of the inputs are 1.

T

The CPU has the ability to accept input from and provide output to external devices

F

The Data Link layer of the OSI model uses routing protocols to select optimal paths between two end systems

T

The Hungarian notation is a variable naming method that gives each variable an identifier at the beginning of the variable name describing the data type contents.

T

The Intel 4004 was named after the number of transistors aboard

T

The Internet is a network of networks

Session

The _____ layer of the OSI model is responsible for translation, formatting, and syntax selection. a. Presentation c. Application b. Session d. Data Link

F

The Jacquard loom addressed a problem that was directly related to issues in navigation.

F

The MCP is the software control center of the modern computer.

GUI

The Macintosh had the first mass-produced ____ , an interface that uses graphical instead of text commands. a. ARPA c. GUI b. SMP d. MP

T

The NTFS file management system is used to locate files on a storage medium.

seven

The OSI conceptual model for the communication process has _____ discrete layers. a. four c. seven b. five d. nine

98

The PCI system bus consists of _____ wires. a. 10 c. 98 b. 20 d. 198

F

The TCP protocol has provisions for addressing the packets to ensure that they get to the correct place.

T

The TCP/IP protocol lies at the heart of the Internet

T

The Telnet protocol runs above the TCP/IP layer.

Datagrams

The Transport layer of the OSI model uses data units called _____. a. Words c. bitgrams b. Datagrams d. bytegrams

sequence

The UML ____ diagram shows how one class communicates with another by sending messages back and forth. a. class c. collaboration b. sequence d. sequence

F

The UNIVAC incorrectly predicted the outcome of the 1952 election

T

The UNIX rlogin command can be exploited by crackers.

T

The Unicode character standard is compatible with the extended ASCII standard.

F

The Unicode method of character representation is fast becoming obsolete.

F

The Von Neumann architecture supports the parallel execution of instructions.

T

The Von Neumann machine's operation is governed by a program loaded into memory.

F

The Windows operating system no longer provides a command-line interface.

T

The Xerox Alto featured graphics, menus, icons, windows, and a mouse

SDLC

The ____ describes the life of the application, including all of the stages involved in the development, testing, installation, and maintenance of a program. a. SDLC c. SLC b. UML d. DBA

collaboration

The ____ diagram shows how system elements work together to accomplish the system's objectives. a. activity c. collaboration b. component d. deployment

.zip

The ____ extension is one of the more popular compression formats in the world of Windows. a. .bat c. .zip b. .car d. .exe

disk defragmenter

The ____ improves performance by minimizing movement of the read/write heads. a. file system c. hash key b. disk defragmenter d. directory

data dictionary

The ____ is created by reviewing the screens and reports the end user would like included in the application and determining which fields are essential to the application. a. use case c. class diagram b. data dictionary d. sequence diagram

kernel

The ____ is the core of the OS. a. file manager c. GUI b. scheduler d. kernel

customer relations representative

The ____ is the interface between the testers, developers, and end users during the creation and early release cycles of the product. a. project manager c. database administrator b. programmer d. customer relations representative

project manager

The ____ is the leader of the team and is responsible for choosing the right players for the right positions. a. database administrator c. client b. project manager d. programmer

machine language

The ____ is the lowest-level language that is directly understood by a computer. a. object oriented language c. assembly language b. constructor d. machine language

master file table

The ____ is used in NTFS to store data about every file and directory on the volume. a. directory c. cluster b. master file table d. overflow area

file allocation table

The ____ keeps track of which files are using which clusters. a. file allocation table c. hash key b. directory d. random area

TCP

The _____ protocol establishes a virtual circuit with the destination computer to transmit packets. a. TCP c. HTTP b. IP d. FTP

FTP

The _____ protocol is used to provide the reliable and efficient transmission of data files. a. UDP c. FTP b. TCP d. IP

Web

The _____ server is just a computer that is programmed to respond to HTTP requests. a. Network c. Internet b. Protocol d. Web

selection

The _____ sort starts at the first value in the list and then processes each element looking for the smallest value. a. merge c. selection b. counting d. radix

bubble

The _____ sort starts with the last element in the list and compares its value to that of the item just above it in the list order. a. bubble c. heap b. insertion d. quick

Hypertext Transfer Protocol

The acronym HTTP stands for _____. a. Heuristic Transport Type Protocol b. Hexadecimal Task Test Protocol c. Hypertext Transfer Protocol d. Hypertext Transition Protocol

F

The assembly language instruction inc is used to compare values.

T

The assembly language instruction jnz tests the value of the zero flag maintained by the system

F

The bit error rate usually increases as the transfer rate decreases

T

The bubble sort is highly inefficient in terms of processing speed.

T

The client is the driving force behind a software development project.

T

The combination of gates enables the computer to do all the things that it does.

F

The computer has a crystal clock called a(n) control clock that times, or synchronizes, each of the steps in the fetch-execute cycle

amplitude

The computer samples sound at fixed intervals and each sample is assigned a binary value according to its ____. a. frequency c. amplitude b. period d. pitch

T

The computer scientist's flowchart can be used as a roadmap to describe how a system should be developed

T

The computers attached to a network are often referred to as nodes.

positional

The concept of ____ value is common to all modern numbering systems. a. positional c. deterministic b. radical d. random

Open architecture

The concept of computer design that allows for future modifications and additions by members of the public is known as which of the following? a. closed architecture c. open architecture b. proprietary architecture d. licensed architecture

ubiquitous computing

The concept of each person interacting with many, sometimes invisible computers has been named "____" by computer scientist Mark Weiser. a. 1984 c. massive parallelism b. ubiquitous computing d. nanotechnology

T

The concept of functional dependency includes the determinant and related columns.

T

The conversion algorithm from base 10 to another base utilizes a sequence of remainders to construct the new number.

F

The cost of manufacturing storage devices with no moving parts is considerably more than a conventional hard drive.

F

The database administrator is responsible for writing source code to meet the functional needs of the end user.

256

The decimal equivalent of 10016 is ____. a. 116 c. 256 b. 160 d. 1600

F

The decimal equivalent of 111112 is 31000.

T

The difference between adding numbers in base 10 and any other base lies in the carry process.

T

The disadvantage of relative file access is that disk space can be wasted if data does not fill the entire record if some of the relative records do not have data

F

The distinction between LANs and WANs is clear and well defined

F

The do-while loop is considered a precondition loop.

256

The eight bit extended ASCII (American Standard Code for Information Interchange) character set can be used to represent ____ characters. a. 128 c. 512 b. 256 d. 34,168

F

The fastest way to access data is via sequential access.

T

The first Microsoft file system was called the file allocation table

F

The first address or position in an array starts with the number one (1)

T

The flip-flop circuit latches onto a bit and maintains the output until it is changed.

T

The following code fragment is an example of an endless loop: int iCount = 1; while (iCount <= 5) { System.out.println("I am on number " + iCount); }

F

The original Eniac computer occupied approximately 50 square feet of space.

T

The parent-child structure has nearly unlimited logical depth.

T

The parts of a computer system, such as the CPU, memory, keyboard, monitor, and network adapter, all function at different speeds.

apartment number

The port number can be analogized to which of the following address components? a. street address c. zip code b. city d. apartment number

F

The for and while loops are considered postcondition loops

T

The hexadecimal number system uses letters to represent digits beyond nine.

F

The hexadecimal numbering system has seventeen unique digits.

F

The hexadecimal numbering system runs out of digits after ____. a. E c. G b. F d. H

subscript

The index or _____ tells the computer which memory cell to access in the array. a. superscript c. pointer b. subscript d. arrow

T

The information kept in a database is kept in natural or sequential order.

T

The insertion sort is modeled after the manual process of sorting cards.

browser wars

The integration of Internet Explorer with the dominant Windows operating system was the turning point in what came to be known as the "____". a. Internet affair c. code conflict b. browser wars d. network nightmare

internetwork

The loose collection of networks called "the Internet" is the short form of which of the following words? a. internetwork c. interarpanet b. internexus d. interconnect

root

The main directory level is also called the ____ level. a. root c. leaf b. child d. primary

T

The main purpose of MRAM is to replace DRAM.

F

The memory cells of an array may store different types of data

T

The middle part of the IP address identifies the host on the network

F

The most commonly used form of mass storage is the floppy disk drive.

F

The most popular transmission medium has been silicon

T

The mouse is considered to be a primary input device.

T

The need to be aware of the complex mix of technological requirements and historical forces is part of a computer scientist's job

root

The node that begins the tree is called the _____. a. branch c. root b. child d. leaf

24

The normal copper wire is capable of carrying _____ voice channels. a. 4 c. 24 b. 16 d. 48

T

The normal copper wire that comes into your home is capable of speeds up to 1.5 Mbps.

0.0001

The number 10^-4 evaluates to which of the following? a. 0.000001 c. 0.0001 b. 0.00001 d. 10000

T

The number of pixels in each row and column defines the resolution of a display.

F

The number of words used for each sound sample determines how many unique amplitude levels can be represented.

T

The one-to-many entity relationship is the most common.

interrupt

The operating system reallocates the CPU through a program known as a(n) ____ handler. a. interrupt c. control b. job d. disruption

platform

The operating system running on a computer is often called its ____ and is typically tied to a particular CPU. a. support c. intermediary b. platform d. driver

domain

The problem of having to remember IP addresses was solved by allowing Web servers to have _____ names. a. range c. resource b. locator d. domain

formatting

The process of ____ arranges the disk surface into addressable areas and sets up the basic directory tree structure on the disk. a. organizing c. templating b. formatting d. shaping

recursion

The process of a routine calling itself is called _____. a. counting c. iteration b. recursion d. modularization

Conversion

The process of changing image format from one type to another is called ____. a. Conversion c. blurring b. Rotating d. cropping

Concatenation

The process of combining or joining strings into one value is known as ____. a. concatenation c. nesting b. instantiation d. inheritance

raster

The process of painting an image on the screen of a monitor is called ____ scanning. a. raster c. cathode b. roster d. dpi

T

The processes that are running under Windows may be viewed by pressing the Ctrl+Alt+Del key combination

F

The project manager is assigned the role of creating and maintaining the database structure.

robotics

The science of ____ is primarily concerned with the mechanics and electronics that are used to carry out the results of the other areas of artificial intelligence. a. fuzzy logic c. pattern recognition b. robotics d. natural language processing

F

The selection sort is highly efficient for large lists

domain

The set of possible values for each column is called the _____ of that column. a. domain c. image b. range d. codomain

normalization

The set of rules that dictates how databases are designed is called _____. a. normalization c. customization b. standardization d. invocation

F

The shell sort incorporates a bubble sort to organize data.

T

The signal to noise ratio measures the quality of a communications channel

F

The social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as hacktivism.

F

The software engineer is responsible for making sure programs function correctly and meet the specified functional requirements set forth in the design document.

F

The software engineer is responsible for pulling together all the pieces of the project and incorporating them into the design document.

F

The standard port number for HTTP is 21, and for FTP it is 80.

T

The statement "anArray [2] = 5;" assigns the number five (5) to the third component of anArray

4 bytes

The storage requirement for the int data type in Java is ____. a. 2 bytes c. 6 bytes b. 4 bytes d. 8 bytes

attenuation

The tendency of a signal to become weaker over distance is known as _____. a. amplification c. attenuation b. alienation d. amelioration

parallel

The term ____ computing or ____ architectures refers to linking a number of CPUs to work on a task simultaneously. a. parallel c. serial b. sequential d. monolithi

sequential access

The term ____ implies reading and writing data in order, from the beginning. a. random access c. Collision b. hashing d. sequential access

biometrics

The term ____ is used to describe biological identification, such as fingerprints, voice dynamics, or retinal scans. a. biometrics c. ergonomics b. cookie d. hacktivism

phreaking

The term ____ is used to describe the process of subverting the phone system in order to get free service. a. phreaking c. biometrics b. honey pot d. callback

syntax

The term ____ refers to the spelling and grammar used within a programming language. a. interpreter c. declaration b. syntax d. event

F

The term attribute is used to describe the symbols used to manipulate the data contained in variables.

F

The term dumpster diving refers to an attack on a system that can include snooping, eavesdropping, and interception.

F

The term identifier is used to describe the characteristics of an object.

T

The term polymorphism is used to describe an object's ability to use the same expression to denote different operations

T

The term precedence describes the order in which something is executed

F

The term radix is synonymous with positional value.

T

The term vulnerability refers to the sensitivity of information and the skill level needed by the attacker to threaten that information.

F

The third normal form creates columns that are independent of the primary key.

classes

The total pool of IPv4 addresses is separated into groups, called _____. a. classes c. aggregations b. entities d. clusters

opposite

The truth table for the NOT gate shows that the output is the ____ of the input. a. square c. opposite b. first derivative d. same

XOR

The truth table for the ____ gate indicates that the output is 1 only when the inputs are different. a. OR c. AND b. XOR d. NAND

T

The upper bound of an array initialized to a size of five (5) is position number four (4)

T

There are many SQL dialects.

F

There are only four ways to modify or transform a graphic

T

There is a top-level DNS server for each of the top-level domains.

T

There is no universal software tool that can be applied to the entire spectrum of tasks.

slicing

Time-____ is a method that allows multiple processes to share the CPU. a. switching c. solving b. sourcing d. slicing

sign

To find the ____ of a given bit, flip it to the opposite state. a. root c. position b. complement d. sign

rotate

To flip an image upside down, the user would ____ it 180 degrees. a. resize c. crop b. rotate d. scale

first

To put the table into the _____ normal form, a separate row needs to be created for each row-column intersection with more than one value. a. first c. third b. second d. fourth

F

Tracks are contained within sectors

encryption

Transforming original data into coded data so that only authorized parties can interpret it is known as ____. a. authentication c. piracy b. packet filtering d. encryption

T

Transistors are simply small electronic switches that can be in either an on or an off state.

T

True Routers work in a manner similar to the way mail is delivered.

Inductance

Twisting copper wires nearly eliminates the electromagnetic effect known as _____. a. inductance c. Resonance b. resistance d. Impedance

F

Typing the following statement at the command prompt will compile the MyProg1.Java file. java MyProg1.java

Modeling

UML or Universal ____ Language diagrams are used to develop object-oriented systems and programs. a. Modeling c. Master b. Markup d. Middling

F

UNIX and DOS natively use a graphical user interface.

F

UNIX commands can be used to manipulate data structures within a database.

F

Under FAT, an administrator can specify which individual users or groups or users can perform certain operations on files and directories

F

Unguided media cannot transmit or carry electromagnetic signals.

16

Unicode character representation uses a(n) ____ bit standard. a. 4 c. 8 b. 7 d. 16

T

Unlike repeaters and hubs, bridges have intelligence.

T

Updating a sequential file requires the entire file to be copied to a new file, modifying the record as it is written to the new file.

110012

What is the result of converting the decimal number 25to a base 2 equivalent? a. 100012 c. 110012 b. 100112 d. 111012

T

User-phobia is the fear that if you include the end user in the design process, the application will be a failure

routers

Using _____, a packet can just be sent on an alternate line if the desired line is damaged or busy. a. hubs c. switches b. routers d. linkers

Mosaic

Using the Berners-Lee protocols, Marc Andreesen created the browser that had the most impact beyond the walls of academia: ____. a. Internet Explorer c. Mosaic b. Next d. Impact

doubles

What type of data can be stored in an array generated by the statement, "int[ ] aGrades = new int [5]"? a. strings c. floats b. doubles d. integers

F

Variable names in Java can begin with letters, underscores, and numbers

compression

Various ____ techniques have been designed to allow the same image information to be stored in a smaller file. a. consolidation c. scanning b. compression d. resolution

millions

Very Large-Scale Integration (VLSI) chips hold ____ of circuits. a. hundreds c. millions b. thousands d. trillions

T

Wearable computers have been designed to be used as language translators.

F

Web page design tools such as Microsoft Front Page or Macromedia Dreamweaver have made HTML obsolete.

11102

What binary number results from adding 1112 and 1112? a. 10002 c. 11102 b. 10112 d. 11112

19

What is the result of converting the decimal number 25to a base 16 equivalent? a. F c. 1A b. 19 d. 31

interrupt

When an I/O device places a voltage signal on a(n) ____ line, the associated chip checks its priority before passing it on to the CPU. a. poll c. interrupt b. job d. JCL

F

When power is turned on, the CPU begins executing the instructions located in the CMOS chip.

T

When testing, you should keep a log of the errors encountered during testing and after the release of the application.

keys

When the columns are used to determine the sort order of information they are called _____. a. markers c. flags b. keys d. tokens

programming

When you are diagramming and creating flowcharts, you are principally engaged in ____ tasks. a. programming c. Web b. office d. network repair

DNS

When you type in a URL in the address bar of your browser, you send a _____ lookup request to the _____ server at your ISP. a. POP c. SND b. DNS d. NET

Create Table

Which of following is a valid SQL command for constructing a table? a. BUILD TABLE c. MAKE TABLE b. SETUP TABLE d. CREATE TABLE

Null

Which of the following SQL key words indicates that data is not required for a specified column? a. NULL c. NOT b. NOTHING d. VOID

Select

Which of the following SQL statements is most commonly used? a. INSERT c. DELETE b. CREATE d. SELECT

Satellite

Which of the following WAN technologies use the same unguided media as television? a. DSL c. cable b. dial-up d. satellite

Array

Which of the following can be classified as a data structure? a. Integer c. Character b. Array d. Float

Insert

Which of the following commands can be used to add new rows of data to a table? a. INCREASE c. INSERT b. ADD d. INCLUDE

fdisk

Which of the following commands enables UNIX to partition a disk drive? a. FDISK c. pdisk b. PDISK d. fdisk

Tim Berners-Lee

Which of the following computer scientists invented the World Wide Web? a. E.F. Codd c. Marc Andreesen b. Tim Berners-Lee d. Donald Knuth

E.F. Codd

Which of the following computer scientists made significant contributions to relational database management? a. Grace Hopper c. Alan Turing b. E.F. Codd d. John Von Neumann

arrays

Which of the following data structures adapts least efficiently to dynamic memory allocation. a. linked lists c. stacks b. queues d. arrays

queue

Which of the following data structures uses a tail pointer? a. stack c. array b. queue d. binary tre

GIF

Which of the following graphical formats should be favored for animation and small file size? a. BMP c. JPG b. GIF d. TIF

managing resources

Which of the following is a primary function of an operating system? a. managing resources c. generating flowcharts b. generating documents d. solving differential equations

Desc

Which of the following is a valid SQL word used to return data in descending order? a. BOTTOM c. DESC b. OPP d. REV

MPEG

Which of the following is an example of a video compression format? a. BMP c. MPEG b. GIF d. TIF

two's complement

Which of the following methods represents the most common way of storing signed numbers? a. one's complement c. integer complement b. binary complement d. two's complement

Windows XP

Which of the following operating systems supports multitasking? a. Windows XP c. MS-DOS b. CP/M d. Apple II

UNIX

Which of the following operating systems was designed to accommodate multiple users and multiple tasks? a. DOS c. UNIX b. CP/M d. Windows 3.0

OS/2

Which of the following operating systems was developed jointly by IBM and Microsoft? a. NOS c. Linux b. OS/2 d. Unix

pop

Which of the following operations removes an item from a stack? a. pop c. delete b. remove d. eject

Microsoft.NET

Which of the following programming environments is actually a platform hosting a number of distinct languages? a. Borland JBuilder c. CodeConqueror b. Microsoft.NET d. Rhodes

merge sort

Which of the following routines implements two list structures to perform sorting operations? a. merge sort c. bubble b. selection sort d. quicksort

quicksort

Which of the following sorting routines incorporates a problem solving technique known as divide and conquer? a. counting c. bucket b. radix d. quicksort

CD-ROM

Which of the following storage forms is non-volatile? a. DRAM c. DDRAM b. SRAM d. CD-ROM

Vacuum tubes

Which of the following technologies made electronic computing possible? a. reusable pins c. vacuum tubes b. punch cards d. keyboards

Integrated development environment

Which of the following terms describes a software development interface that incorporates all of the necessary tools needed to write, compile, and distribute programs? a. Integrated development environment b. Object oriented programming c. Variable initialization d. Hungarian notation

Directory

Which of the following terms describes an organizational unit within a storage medium that stores files, folders, and subdirectories? a. Directory c. File compression b. Fragmentation d. Volume

USB drive

Which of the following terms describes flash memory in a small, durable portable case that can be plugged into a USB port of a computer and used in the same manner as a disk drive? a. USB cache c. USB disk b. USB port d. USB drive

MRAM

Which of the following terms describes memory that uses the polarization of microscopic magnetic layers to store ones and zeros that remain after the power source is removed? a. DRAM c. ROM b. MRAM d. SRAM

multiprocessing

Which of the following terms refers to computing with more than one CPU? a. multitasking c. multileveraging b. multilayering d. multiprocessing

desktop publisher

Which of the following tools specializes in sophisticated page layout? a. project scheduler c. text editor b. desktop publisher d. spreadsheet

Weapons development

Which of the following war-time activities caused the U.S. Navy Board of Ordinance to sponsor the development of the first modern electronic computer? a. ship building c. weapons development b. aerial reconnaissance d. map-making

UNIVAC

Which of the following was the first commercially viable computer? a. UNIVAC c. Mark I b. ENIAC d. EDVAC

transistor

Which piece of technology replaced the vacuum tube? a. transistor c. capacitor b. diode d. resistor

F

Whole numbers or integers are internally represented by the computer as hexadecimal numbers.

UNIX

Wildcard specifications are case sensitive in ____. a. UNIX c. Windows XP b. DOS d. MAC OS

T

Windows and DOS use the FDISK command to partition the drives.

T

Wireless networking uses the same technology as the radio in your car and the cell phone in your pocket

rapid prototyping

With ____ tools are available that allow end users to work with prototypes of the screens and other interfaces. a. incremental development c. build and fix b. rapid prototyping d. waterfall

NAT

With _____, multiple computers can share one Internet connection. a. NAT c. TCP/IP b. DHCP d. UDP

offset

With arrays, the _____ is used to specify the distance between memory locations. a. offset c. length b. width d. address

T

With respect to FAT, data is stored in 512-byte sectors on the hard drive and depending on the size of the file, the data might occupy one or more sectors

T

With respect to ease of use, the BASIC programming language is superior to machine code language.

T

With the FAT file management system, deleting a file does not actually remove it from the hard drive. Instead, a hex value of E5h is placed in the first position of the file name.

T

With the Von Neumann machine, instruction execution is carried out by a central processing unit that contains a control unit, an arithmetic logic unit, and registers.

T

With the introduction of the semiconductor, both the cost and size of computers were reduced while speed and reliability were improved.

T

Without a database most applications would be useless.

T

Without protocols, computers would not function.

T

Word-processed documents may be input into desktop publishers

UML

____ is a software modeling process that enables system developers to create a blueprint showing the overall functionality of the program being engineered and provides a way for the client and the developer to communicate. a. SDLC c. UML b. Scope creep d. Prototyping

IPCONFIG

You can check the network configuration of your computer in Windows by using the _____ command. a. IPSETUP c. NETWORK b. IPCONFIG d. NETDESIGN

T

You can compress information by replacing repeating patterns with a code.

F

You can directly connect to a National Backbone Provider from your home computer.

F

You should have at least three people in charge of creating and maintaining the databases.

point-of-presence

Your Internet provider maintains a switching center called a _____. a. nexus c. cusp b. point-of-presence d. receive-and-send

Inheritance

___ is the process of providing more class functionality by creating more specific classes based on generic classes. a. Variable initialization c. Inheritance b. Encapsulation d. Polymorphism

Brandwidth

___ measures the speed a transmission medium is able to handle in bits per second. a. Brandwidth c. Bit capacity b. Byte capacity d. Broadwidth

Boolean

____ algebra is concerned with the logic of the operators AND, OR, and NOT. a. Linear c. Boolean b. Modern d. Fibonacci

Wildcards

____ are characters that are used to match any character at the end of a file name to a particular file extension. a. Deuces c. Aces b. Jokers d. Wildcards

Binary files

____ are more compact and faster to access because the system does not have to convert the data. a. Binary files c. Hash files b. Sequential files d. Random files

Backdoors

____ are shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers. a. Checksums c. Backdoors b. Heuristics d. Bots

Partitions

____ are simply broad divisions of the total capacity of the disk into specific OS areas. a. Segments c. Categories b. Portions d. Partitions

Ethics

____ are the moral principles for judging right or wrong behavior held by an individual or group. a. Digital certificates c. Ethics b. Laws d. Ergonomics

Neural networks

____ are well suited for applications such as visual speech recognition applications. a. DVRs c. Turing tests b. Quantum computers d. Neural networks

Use cases

____ describe a system's behavior from a user's standpoint. a. Classes c. Use cases b. Objects d. States

Project feasibility

____ determines whether the project is worth doing, and specifying the advantages and disadvantages of this application. a. Software specification c. Scope creep b. Project collaboration d. Project feasibility

Routers

____ direct network traffic based on the logical (IP) addresses assigned at the third layer of the OSI stack. a. Bridges c. Hubs b. Routers d. Gateways

Sequential

____ file access allows you to mimic the look of a database table by storing information in the file row by row, similar to a database record. a. Hash c. Sequential b. Binary d. Random

Flash memory

____ functions as erasable, rewritable ROM memory. a. Flash memory c. Speech recognition b. Natural language processing d. Machine learning

Random access

____ implies that data is directly read or written anywhere on the disk. a. Sequential access c. Random access b. Hashing d. Collision

Graphics

____ in the form of logos, cartoons, and maps play a large part in the world of information sharing. a. Texts c. Databases b. Graphics d. Protocols

Binary

____ instructions are processed sequentially by fetching an instruction from memory, and then executing that instruction. a. Binary c. DRAM b. MRAM d. USB

Packet switching

____ involves dividing messages into blocks that can be reassembled at their destination, with each block possibly following a different path. a. Multiplexing c. Packet switching b. Linking d. Decoding

Spyware

____ is a catchall phrase for programs that sit on your computer, with or without your knowledge, observing your computer activities. a. Cookie c. Spyware b. Encryption d. Social engineering

Hashing

____ is a common method used for accessing data either in a file or a database table through the use of a unique value. a. Clustering c. Hashing b. Disk fragmenting d. File compressioN

Macromedia Fireworks

____ is a graphics tool popular with Web designers. a. Tron c. Redux b. Macromedia Fireworks d. Starry Messenger

Holographic storage

____ is a method of splitting a laser beam and using a device called a spatial light modulator to store full pages of information in layers on a crystal material. a. Fuzzy logic c. Holographic storage b. Pattern recognition d. Speech recognition

Object-oriented programming

____ is a style of programming that involves representing items, things, and people as objects rather than basing the logic around actions. a. Object-oriented programming c. Variable initialization b. Assembly programming d. Polymorphism

Fuzzy logic

____ is a superset of conventional logic that has been extended to handle the concept of partial truth. a. Neural networks c. Fuzzy logic b. Robotics d. Speech recognition

NTFS

____ is often referred to as a "journaling" file system because it keeps track of transactions performed when working with files and directories. a. FAT c. MFT b. NTFS d. EFS

Software piracy

____ is the illegal copying of software . a. Software piracy c. Social engineering b. Biometrics d. Dumpster diving

Instantiation

____ is the process of creating an object based upon a class. a. Inheritance c. Instantiation b. Concatenation d. Variable initialization

Software engineering

____ is the process of producing software applications. a. Database administration c. UML b. Software engineering d. SDLC

Artificial intelligence

____ is the science and engineering of making intelligent machines. a. Nanotechnology c. Quantum mechanics b. Magnetic storage d. Artificial intelligence

Quantum mechanics

____ is the study of matter and radiation at the atomic level. a. Fuzzy logic c. Robotics b. Pattern recognition d. Quantum mechanics

Collisions

____ occur when the hashing algorithm generates the same relative key for more than one original key value. a. Clusters c. Compressions b. Directories d. Collisions

Disk fragmentation

____ occurs when files have clusters scattered in different locations on the storage medium rather than in contiguous locations. a. Clusterization c. Hashing b. Disk fragmentation d. Disk striping

Scope creep

____ occurs when new changes are continually added to a project thus changing the proposed completion date so that the project is never completed, but is instead in constant improvement mode. a. SDLC c. Scope creep b. Prototyping d. Testing

Binary

____ patterns contain information about the color and brightness of a pixel. a. Binary c. Decimal b. Octal d. Hexadecimal

Natural language

____ processing involves computer applications that can recognize and interact with natural language text. a. Assembly language c. High-level language b. Machine language d. Natural language

NTFS

____ provides the ability to assign access rights to files and directories. a. FAT12 c. NTFS b. FAT24 d. FAT32

Infrared

____ pulses allow transmission rates up to 4 Mbps. a. Microwave c. X-ray b. Infrared d. Ultraviolet

Cardinality

____ shows the numeric occurrences between entities in an ER model. a. Functionality c. Transitivity b. Cardinality d. Dependency

XML

_____ formats content for display in a browser and transfers information via the Web. a. SGML c. HTML b. XML d. PHP

Scripting

_____ languages allow a Web page developer to include dynamic properties. a. Scripting c. Presentation b. Hosting d. Staging

Guided

_____ media are physical media such as copper wire or fiber-optic cable. a. Directed c. Undirected b. Guided d. Oriented

F

pcAnywhere affords remote access to all PCs, whether or not a version of this software is installed in the remote device


Set pelajaran terkait

Ch. 10 Making Capital Investment Decisions

View Set

Math Unit 6, QUIZ 3: INDIRECT MEASURE

View Set

Learning Curve: 6a How Do We Learn? and Classical Conditioning

View Set

[Grade 10 Science: Physics] Chapter 10 Review

View Set

MRKT 239 Test 1 The impact of environmental forces on value can be extensive as market changes can easily influence how stakeholders perceive certain products.

View Set