I

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

False

Building a good model can be a difficult task that requires us to capture, in translational form, all the important factors that influence the behavior of a system. _________________________

computational

Simulation model is another term for ___________ model.

True

Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.

True

Some physical models have serious moral and ethical consequences.

The program implementation phase is the time to plan how it is to be done. _________________________ You Answered True Correct Answer False Question 20 / 1 pts In early programming languages, conserving machine resources was not an issue. You Answered True Correct Answer False Question 30 / 1 pts In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. tasks You Answered programs Correct Answer memory locations subtasks Question 41 / 1 pts If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn't introduced a new error into code that was previously correct. Correct! True False Question 51 / 1 pts C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________ Correct! False True Question 61 / 1 pts Using a single processor, finding the largest of N numbers takes ____ time. θ(NlogN) θ(N2) Correct! θ(N) θ(1) Question 70 / 1 pts A device _______ is a program written to interact with an I/O device. object You Answered hook Correct Answer translator driver Question 81 / 1 pts Logic programming languages are sometimes called declarative languages. _________________________ Correct! True False Question 90 / 1 pts A high-level language program is called a(n) ____ program. token object You Answered lexical Correct Answer source Question 100 / 1 pts In BNF, the ____ is used to separate two alternative definitions of a nonterminal. You Answered backward slash asterisk forward slash Correct Answer vertical bar Question 110 / 1 pts In global optimization, the compiler looks at ______ segments of the program to decide how to improve performance. You Answered small Correct Answer large syntactical incorrect Question 120 / 1 pts Following ____, the compiler makes a second pass over the parse tree to produce the translated code. You Answered lexical analysis code generation Correct Answer semantic analysis code optimization Question 130 / 1 pts State ____ is always the start-up state of the Turing machine. 0 Correct Answer 1 You Answered R L Question 140 / 1 pts The proof by ____ approach assumes that a specific Turing machine does exist and then shows that this assumption leads to an impossible situation. Correct Answer contradiction deduction You Answered impossibility inference Question 150 / 1 pts A Turing machine ____ is a collection of instructions that allow a Turing machine to carry out a certain task. tape You Answered algorithm sequence Correct Answer program Question 160 / 1 pts The ____ thesis can never be proved because the definition of an algorithm is descriptive, not mathematical. Church-Zimmerman You Answered Alan-Zimmerman Church-Alan Correct Answer Church-Turing Question 171 / 1 pts If we are not happy with our original design using a(n) ____, we only need to change some numerical parameters and rerun the model. virtual model physical model Correct! simulation equation Question 181 / 1 pts A ____ is a representation of the system being studied, which we claim behaves much like the original. replica Correct! model problem concept Question 190 / 1 pts A model of a business in which customers walk into the store at random times employs a model that uses ____ rather than precise and exact equations. You Answered numerical approximations algebraic approximations probabilistic approximations Correct Answer statistical approximations Question 200 / 1 pts We model the behavior of a system only at an explicit and finite set of times. Correct Answer True You Answered False Question 211 / 1 pts To the user, distributed databases look like a single database, just with slightly slower access times. False Correct! True Question 221 / 1 pts The correspondence between primary keys and compound keys is what establishes the relationships among various entities in a database._________________________ Correct! False True Question 230 / 1 pts A ____ is a collection of databases that contain current and archived data used for research and analysis purposes rather than to manage day-to-day business transactions such as inventory control or payroll data. data mine You Answered data broker daisy chain Correct Answer data warehouse Question 240 / 1 pts To manage a relational table, you need only be able to add new tuples to the table and delete tuples from a table. You Answered True Correct Answer False Question 250 / 1 pts ____ is a well-known humanoid robot built by Honda Motor Company. You Answered ISSAC Correct Answer ASIMO CIVIC ROBOTO Question 261 / 1 pts A(n) ____, also called an expert system, attempts to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion. inference engine Correct! rule-based system back propagation system intelligent agent Question 271 / 1 pts Proponents of the reactive strategy of robotics argue that a robot cannot react meaningfully without processing the stimulus and planning a reaction based on its internal representation of the environment. _________________________ Correct! False True Question 281 / 1 pts Any knowledge representation scheme we select must be relatively easy to extend to include new knowledge. Correct! True False Question 290 / 1 pts Rotation is the lateral (up, down, right, left, in, out) movement of every point in an object by the same amount and in the same direction. _________________________ Correct Answer False You Answered True Question 301 / 1 pts In an MMOG, the system must simply ensure that all users adhere to the rules of the game, not the legality of the operations. True Correct! False Question 311 / 1 pts In the technique known as ____, first it is determined which planes can be seen from the user's point of view, based on location and opaqueness, and then only those objects visible in the next frame are rendered, omitting all operations on hidden surfaces. striping Correct! culling slicing clicking Question 321 / 1 pts A noncompetitive MMOG is sometimes called a ____. Correct! metaverse microverse nanoverse miniverse Question 330 / 1 pts Perhaps the most famous ____ was the German philosopher Immanuel Kant, who was born in the eighteenth century. You Answered utilitarian hacktivist Correct Answer deontologist Consequentualist Question 340 / 1 pts ____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others. Consequentialist You Answered Utilitarian Correct Answer Deontological Hacker Question 351 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. iTunes Music Store Correct! iAlbums digital store Apple Music Experience AppleOne Music

A modern programming EXE provides a text editor, a file manager, a compiler, a linker and loader, and tools for debugging, all within this one piece of software. _________________________ Correct! False True Question 21 / 1 pts A ____ stores and fetches values to and from memory cells. memory cache encoder Correct! random access memory flash memory read-only memory Question 30 / 1 pts Even though a high-level programming language allows the programmer to think of memory locations in abstract rather than physical terms, the programmer is still directing, via program instructions, every change in the value of a memory location. Correct Answer True You Answered False Question 41 / 1 pts Each language learned about the uses of its own notation (--, //, or #) to denote a program comment. False Correct! True Question 51 / 1 pts C++ was designed with engineering applications in mind. _________________________ Correct! False True Question 61 / 1 pts Old computer code that is still in use is known as ____. portable code Y2K code Correct! legacy code spaghetti code Question 71 / 1 pts ____ was the first high-level programming language that was actually implemented. COBOL BASIC Correct! FORTRAN PL-1 Question 80 / 1 pts Today ____ is still strong in the transportation industry (aircraft, helicopters, subway systems, European high-speed train control systems) and in safety monitoring systems at nuclear reactors as well as in financial and communication systems. C You Answered C++ Java Correct Answer Ada Question 91 / 1 pts In BNF, the syntax of a language is specified as a series of rules. _________________________ Correct! True False Question 100 / 1 pts Building two parse trees implies that the parser has demonstrated correctness in two different ways. _________________________ You Answered False Correct Answer True Question 110 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. You Answered code optimization BNF OOP Correct Answer parsing Question 120 / 1 pts In the ____ phase, the compiler examines the individual characters in the source program and groups them into tokens. parsing Correct Answer lexical analysis You Answered semantic analysis and code generation code optimization Question 130 / 1 pts A formal basis for proofs might allow for ____ theorem-proving. indisputable unsolvable You Answered observable Correct Answer mechanical Question 141 / 1 pts Turing machines define the limits of ____, which is what can be done by symbol manipulation algorithms. extensibility compatibility correspondence Correct! computability Question 151 / 1 pts A(n) ____ is a statement advanced for consideration and maintained by argument. 5-tuple contradiction Correct! thesis algorithm Question 160 / 1 pts The bit inverter Turing machine should have two states. _________________________ Correct Answer False You Answered True Question 170 / 1 pts If we know the ____, then the computer can generate a sequence of random numbers that follows this pattern, and this sequence accurately models the time it takes to serve customers in real life. random distribution You Answered normalized distribution Correct Answer statistical distribution probabilistic distribution Question 180 / 1 pts _______ is one of the most powerful and useful forms of scientific visualization. Image enhancement Image manipulation You Answered Image virtualization Correct Answer Image animation Question 190 / 1 pts The throw of the dice or the drawing of a card, if looked at programmatically, may be considered a __________. deterministic component You Answered conventional component Correct Answer static component stochastic component Question 200 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. Correct Answer user engineer designer You Answered consumer Question 210 / 1 pts A ____ is an attribute or combination of attributes that uniquely identifies a tuple. Correct Answer primary key preferred key You Answered secondary key foreign key Question 221 / 1 pts The Internet has been around since 1969. Correct! True False Question 230 / 1 pts A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize access time to the records. simple file manager Correct Answer sophisticated file manager You Answered specialized file system special operating system service Question 241 / 1 pts A ____ runs Bitcoin software that verifies (using a hash function) that the blockchain has not been altered in any way since the previous transaction, and for this service, the miner is rewarded with new bitcoins. virtual currency specialist Groupon bot dumpster diver Correct! bitcoin miner Question 250 / 1 pts Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences. swarm intelligence brute force Correct Answer heuristic You Answered back propagation Question 261 / 1 pts Cause and effect relationships are translated into "for every" statements. _________________________ Correct! False True Question 270 / 1 pts A formal language representation has the disadvantage of extracting the essentials. Correct Answer False You Answered True Question 280 / 1 pts A ____ takes us from the initial state to a winning configuration, and the graph nodes along the way represent the intermediate configurations. Correct Answer solution path state-space graph You Answered heuristic brute force approach Question 290 / 1 pts Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is separate from primary memory. PPU Correct Answer GPU CPU You Answered MPU Question 301 / 1 pts The process of "move the model, shoot a frame" was repeated thousands of times when filming King Kong. Correct! True False Question 310 / 1 pts Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a sequence, and the elapsed time. Prolog algorithm wire-frame Correct Answer first and last frame You Answered central cells (CC) Question 321 / 1 pts A movie is an interactive environment. Correct! False True Question 330 / 1 pts A ____ focuses on the consequences of an act to determine if the act is good or bad. Correct Answer consequentialist universalist You Answered PGP dialectic Question 340 / 1 pts Using the utilitarians' criterion requires subjective judgments. _________________________ Correct Answer True You Answered False Question 350 / 1 pts Napster lost the case accusing it of copyright infringement but won subsequent appeals. You Answered True Correct Answer False

Question 11 / 1 pts Source code is also known as _______. compiling instructions link language instructions assembly language instructions Correct! high-level language instructions Question 21 / 1 pts The program implementation phase is the time to plan how it is to be done. _________________________ True Correct! False Question 30 / 1 pts Assembly language programs are ____ specific. compiler language You Answered architecture Correct Answer machine Question 40 / 1 pts Syntax is the rules for exactly how _______ must be written in a programming language. orders instructions Correct Answer statements You Answered executables Question 51 / 1 pts Old computer code that is still in use is known as ____. Correct! legacy code Y2K code portable code spaghetti code Question 61 / 1 pts With a suitable parallel processor, a search for the largest of 1,000,000 numbers requires (2*lgN), or ____ steps. Correct! 40 1 500 1,000,000 Question 71 / 1 pts Compared to functional programming, ____ goes a step further toward not specifying exactly how a task is to be done. logic outlining Correct! logic programming logic interfacing logic structuring Question 81 / 1 pts Logic programming languages are sometimes called declarative languages. _________________________ Correct! True False Question 91 / 1 pts A(n) ____ definition defines a nonterminal symbol in terms of itself. local global ambiguous Correct! recursive Question 100 / 1 pts In the ____ phase, the compiler takes the generated code and sees whether it can be made more efficient, either by making it run faster or having it occupy less memory. parsing You Answered lexical analysis semantic analysis and code generation Correct Answer code optimization Question 110 / 1 pts Online debuggers help programmers locate and correct errors in programs. Correct Answer True You Answered False Question 121 / 1 pts During parsing, a compiler deals only with the ____ of a statement. Correct! syntax rules semantics grammar Question 131 / 1 pts In binary representation, any unsigned whole number n is encoded by a sequence of n + 1 1s. _________________________ Correct! False True Question 140 / 1 pts The bit inverter Turing machine should have two states. _________________________ You Answered True Correct Answer False Question 150 / 1 pts If a Turing machine program consists of the following four instructions: (1,0,1,2,R) (1,1,0,2,R) (2,0,0,2,R) (2,b,b,2,L) then the configuration ____ is a halting configuration. Correct Answer ... b 1 1 b b b ... (current state = 2, symbol 1 is being read) ... b 1 1 b b b ... (current state = 1, symbol 1 is being read) You Answered ... b 1 0 b b b ... (current state = 2, symbol 0 is being read) ... b 1 0 b b b ... (current state = 1, symbol 0 is being read) Question 160 / 1 pts It is important to note that unsolvable problems related to the halting problem are unsolvable because of their ____. simplicity You Answered complexity Correct Answer generality specificity Question 170 / 1 pts We model the behavior of a system only at an explicit and finite set of times. Correct Answer True You Answered False Question 180 / 1 pts ____ is concerned with the technical issues involved in information display, meaning that it deals with the actual algorithms for rendering a screen image. Correct Answer Computer graphics Scientific graphics Scientific visualization You Answered Engineering graphics Question 190 / 1 pts When a system contains stochastic components, it means that there are parts of the system that display _______ behavior. specific You Answered predictable Correct Answer random conventional Question 200 / 1 pts _______ is one of the most powerful and useful forms of scientific visualization. Image virtualization Correct Answer Image animation You Answered Image manipulation Image enhancement Question 210 / 1 pts The Internet has been around since 1969. You Answered False Correct Answer True Question 220 / 1 pts The Census Bureau of the U.S. Department of Commerce estimated ecommerce retail sales in the United States for the first quarter of 2017 to be $105.7 billion, an increase of 14% from the first quarter of 2016. Correct Answer True You Answered False Question 230 / 1 pts Authentication is the process of verifying the identity of the receiver of the data._________________________ You Answered False Correct Answer True Question 241 / 1 pts A ____ runs Bitcoin software that verifies (using a hash function) that the blockchain has not been altered in any way since the previous transaction, and for this service, the miner is rewarded with new bitcoins. Groupon bot dumpster diver Correct! bitcoin miner virtual currency specialist Question 251 / 1 pts In a neural network, both the knowledge representation and also the "programming" are stored in the network itself as the weights of the connections and the thresholds of the neurons. False Correct! True Question 260 / 1 pts Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences. brute force swarm intelligence You Answered back propagation Correct Answer heuristic Question 270 / 1 pts A ____ for a search algorithm illustrates the possible next choices of items to search if the current item is not the target. connectionist architecture You Answered back propagation algorithm Set of training data Correct Answer decision tree Question 280 / 1 pts The human brain uses a ____ architecture, characterized by a large number of simple "processors" with multiple interconnections. Correct Answer connectionist network You Answered Victorian neural Question 291 / 1 pts The process of "move the model, shoot a frame" was repeated thousands of times when filming King Kong. Correct! True False Question 301 / 1 pts ____ is a rapidly growing area of computer and biological science research in which computers and graphics software are used to produce highly accurate two- and three-dimensional images of the human body. Medical processing Virtual medicine Correct! Medical imaging Visual medicine Question 310 / 1 pts In the technique known as ____, first it is determined which planes can be seen from the user's point of view, based on location and opaqueness, and then only those objects visible in the next frame are rendered, omitting all operations on hidden surfaces. You Answered clicking striping slicing Correct Answer culling Question 320 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. game hosts You Answered game servlets game clients Correct Answer game servers Question 331 / 1 pts BitTorrent is the most popular current peer-to-peer file sharing system and accounts for 5% of all Internet traffic._________________________ Correct! True False Question 341 / 1 pts The Napster software set up what's called ____ file sharing. Correct! peer-to-peer client-server MP3 freeware Question 350 / 1 pts The word ____ is from the Greek and means "the study of duty." encryption You Answered modus ponens Correct Answer deontology hacker

Question 11 / 1 pts Source code is also known as _______. Correct! high-level language instructions assembly language instructions link language instructions compiling instructions Question 20 / 1 pts Which language does NOT require a semicolon to terminate an executable program statement? You Answered C++ Ada C# Correct Answer Python Question 30 / 1 pts In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. tasks subtasks You Answered programs Correct Answer memory locations Question 41 / 1 pts Even though a high-level programming language allows the programmer to think of memory locations in abstract rather than physical terms, the programmer is still directing, via program instructions, every change in the value of a memory location. False Correct! True Question 50 / 1 pts C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________ You Answered True Correct Answer False Question 61 / 1 pts Early versions of FORTRAN allowed the use of mathematical symbols such as < to compare two quantities. True Correct! False Question 70 / 1 pts Today ____ is still strong in the transportation industry (aircraft, helicopters, subway systems, European high-speed train control systems) and in safety monitoring systems at nuclear reactors as well as in financial and communication systems. C Java You Answered C++ Correct Answer Ada Question 81 / 1 pts Old computer code that is still in use is known as ____. spaghetti code portable code Correct! legacy code Y2K code Question 91 / 1 pts A(n) ____ is a compiler embedded with a collection of supporting software. debugger visual development library reusable code library Correct! integrated development environment Question 100 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. BNF You Answered code optimization Correct Answer parsing OOP Question 111 / 1 pts ____ is where the compiler polishes and fine-tunes the translation so that it runs a little faster or occupies a little less memory. Generation Compilation Correct! Optimization Efficiency Question 121 / 1 pts In global optimization, the compiler looks at ______ segments of the program to decide how to improve performance. syntactical small incorrect Correct! large Question 131 / 1 pts The bit inverter Turing machine should have two states. _________________________ True Correct! False Question 141 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ True Correct! False Question 151 / 1 pts A Turing machine can produce output on the same tape upon which the input exists. Correct! True False Question 160 / 1 pts The symbols for a Turing machine must come from a finite set of symbols called the tape ____. placeholder You Answered blank Correct Answer alphabet palette Question 171 / 1 pts ____ is concerned with the technical issues involved in information display, meaning that it deals with the actual algorithms for rendering a screen image. Engineering graphics Correct! Computer graphics Scientific graphics Scientific visualization Question 180 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. Correct Answer user You Answered consumer designer engineer Question 190 / 1 pts The dictum ____ says that the results you get out of a simulation model are only as good as the data and the assumptions put into the model. first in, first out first in, last out You Answered last in, last out Correct Answer garbage in, garbage out Question 201 / 1 pts The use of ____ becomes even more important as the amount of output increases and grows more complex. renderings models Correct! visualizations data Question 211 / 1 pts __________ is the basis of Bitcoin cybercurrency. Encrypted chain Correct! Blockchain Chain looping Blockloop Question 220 / 1 pts The Census Bureau of the U.S. Department of Commerce estimated ecommerce retail sales in the United States for the first quarter of 2017 to be $105.7 billion, an increase of 14% from the first quarter of 2016. Correct Answer True You Answered False Question 230 / 1 pts Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones. You Answered False Correct Answer True Question 241 / 1 pts A meta tag is a small text file that the web server sends to the user's browser and that gets stored on the user's hard drive. _________________________ Correct! False True Question 250 / 1 pts At periodic time intervals, ____ technology downloads updated, personalized information on your screen. wizard You Answered spider search engine Correct Answer push Question 260 / 1 pts The ____ causes the network to settle into a stable state where it can correctly respond, to any desired degree of accuracy, to all inputs in the training set. Correct Answer back propagation algorithm connectionist architecture You Answered decision tree solution path Question 271 / 1 pts To be considered a robot, it must be in some way humanoid in design. Correct! False True Question 280 / 1 pts Any knowledge representation scheme we select must be relatively easy to extend to include new knowledge. You Answered False Correct Answer True Question 290 / 1 pts Since a GPU does not have to do general-purpose computing, only image processing, its instruction set can be optimized to perform the specific operations needed by CGI. _________________________ You Answered False Correct Answer True Question 300 / 1 pts The server software that creates the MMOG world is always running and always available, and it always remembers the current state of every player. _________________________ You Answered False Correct Answer True Question 310 / 1 pts The process of "move the model, shoot a frame" was repeated thousands of times when filming King Kong. You Answered False Correct Answer True Question 320 / 1 pts Using computers for entertainment had by the early 1980s become an important, not to mention financially lucrative, industry and that growth has continued unabated. Correct Answer True You Answered False Question 330 / 1 pts The philosopher ____ was known to say "never treat a fellow human merely as a means to an end." Correct Answer Kant You Answered Descartes Turing Aristotle Question 341 / 1 pts The scholarly field of ethics has a long history of studying how to identify and resolve conflicts. Correct! True False Question 351 / 1 pts What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE? Evil Good Correct! Ethically neutral Not relevant

information sharing is a powerful positive good

The "hacker ethic" makes the claim that ____.

False

A brute force approach is commonly used for intelligent chess-playing strategy.

False

A database management system works much like a simple file manager.

True

A disk input/output (I/O) operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________

source

A high-level language program is called a(n) ____ program.

parsing

In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language.

False

In any collection of Turing machine instructions, there can be two different instructions that both begin with the same current state and current symbol.

False

In early programming languages, conserving machine resources was not an issue.

large

In global optimization, the compiler looks at ______ segments of the program to decide how to improve performance.

True

It is possible to discover the same features displayed in a graph from a textual representation of the output of a model, but it would probably take much more time.

stop-motion animation

King Kong's movements in the 1933 film were created using a manual technique called ____.

Question 11 / 1 pts A program written in a(n) procedural language consists of sequences of statements that manipulate data items. _________________________ Correct! True False Question 20 / 1 pts Procedural languages are also called ____ languages. You Answered immediate Correct Answer imperative translated interpreted Question 31 / 1 pts The problem identification document commits the final and complete problem specification to paper and guides the software developers in all subsequent decisions. Correct! True False Question 40 / 1 pts ____ includes online tutorials or help systems that the user can bring up while the program is running, and (less often) written user's manuals. Correct Answer User documentation You Answered Rough documentation Technical documentation First-level documentation Question 50 / 1 pts _________ code is freely available and can be used, distributed, or modified by anyone. Correct Answer Open source Dynamic You Answered Public domain Free code Question 61 / 1 pts Lady Ada Lovelace is regarded as the world's first programmer on the basis of her correspondence with Charles Babbage and her published notes on his work with the Analytic Engine. False Correct! True Question 70 / 1 pts ____ was born out of frustration with existing languages and environments for systems programming. You Answered FORTRAN F# C# Correct Answer Go Question 81 / 1 pts The use of parallelism always reduces processing time because subtasks are being executed concurrently. True Correct! False Question 91 / 1 pts ____ begins at the productions in the tree that are nearest to the original input tokens. Semantic analysis Lexical analysis Correct! Code generation Parsing Question 100 / 1 pts ____ is where the compiler polishes and fine-tunes the translation so that it runs a little faster or occupies a little less memory. You Answered Efficiency Compilation Generation Correct Answer Optimization Question 110 / 1 pts The code a compiler produces should be reasonably efficient and concise. You Answered False Correct Answer True Question 120 / 1 pts Following ____, the compiler makes a second pass over the parse tree to produce the translated code. code generation lexical analysis You Answered code optimization Correct Answer semantic analysis Question 130 / 1 pts In a _______ diagram, circles are used to represent states. binary Correct Answer state You Answered unary tape Question 140 / 1 pts At any point in time, only a finite number of cells in the Turing machine input contain ____ symbols. Correct Answer nonblank alphabetic You Answered placeholder blank Question 151 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ True Correct! False Question 160 / 1 pts Prototypes are an important way of studying many physical and social phenomena. _________________________ Correct Answer False You Answered True Question 171 / 1 pts Computational models can only be graphed and never use three dimensional images. True Correct! False Question 180 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. You Answered designer consumer engineer Correct Answer user Question 190 / 1 pts When a system contains stochastic components, it means that there are parts of the system that display _______ behavior. specific You Answered predictable Correct Answer random conventional Question 200 / 1 pts Computational steering is usually feasible using physical models. _________________________ You Answered True Correct Answer False Question 210 / 1 pts Authentication is the process of verifying the identity of the receiver of the data._________________________ You Answered False Correct Answer True Question 220 / 1 pts Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones. Correct Answer True You Answered False Question 230 / 1 pts Accessing a record in a large file involves at least one disk input/output (I/O) operation(s). Correct Answer True You Answered False Question 241 / 1 pts A database management system can relate information between various tables through ____ values. prepared primary Correct! key special Question 250 / 1 pts Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences. You Answered swarm intelligence Correct Answer heuristic back propagation brute force Question 261 / 1 pts A neuron is a cell capable of receiving stimuli, in the form of sensory input, from other neurons through its many dendrites. True Correct! False Question 270 / 1 pts ____ is the study of how we as humans think and learn. Correct Answer Cognitive science You Answered Neuroscience Social science Artificial intelligence Question 280 / 1 pts The term ____ means the language of formal logic. Correct Answer formal language You Answered graphical scheme logic scheme natural language Question 291 / 1 pts In stop-motion animation, a single photograph is called a ____. Correct! frame block unit cell Question 300 / 1 pts A movie is an interactive environment. Correct Answer False You Answered True Question 311 / 1 pts With a GPU, all imaging responsibilities are offloaded from the GPU to the CPU. True Correct! False Question 321 / 1 pts Using computers for entertainment had by the early 1980s become an important, not to mention financially lucrative, industry and that growth has continued unabated. False Correct! True Question 331 / 1 pts Music file copying has encouraged CD buying over the long term. True Correct! False Question 340 / 1 pts Users had to find each other through the Internet and web before being able to connect and share with Napster. Correct Answer False You Answered True Question 350 / 1 pts Napster is still the most popular peer-to-peer file sharing network in the world. You Answered True Correct Answer False

Question 10 / 1 pts ____ a program means running it on many data sets to be sure its performance falls within required limits. Debugging You Answered Coding Configuring Correct Answer Benchmarking Question 21 / 1 pts In early programming languages, conserving machine resources was not an issue. True Correct! False Question 31 / 1 pts In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. Correct! memory locations programs subtasks tasks Question 41 / 1 pts Most programming languages are now presented within an ____. interactive development environment implementation development environment integrated deployment environment Correct! integrated development environment Question 50 / 1 pts ____ was born out of frustration with existing languages and environments for systems programming. FORTRAN You Answered C# Correct Answer Go F# Question 60 / 1 pts Using a single processor, finding the largest of N numbers takes ____ time. θ(NlogN) Correct Answer θ(N) You Answered θ(1) θ(N2) Question 71 / 1 pts Old computer code that is still in use is known as ____. Y2K code spaghetti code portable code Correct! legacy code Question 81 / 1 pts C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________ Correct! False True Question 91 / 1 pts A grammar that allows the construction of two or more distinct parse trees for the same statement is called a recursive grammar. True Correct! False Question 101 / 1 pts The Greek character lambda represents ___. the defined string Correct! the null string zero the unknown string Question 111 / 1 pts In BNF, the ____ is used to separate two alternative definitions of a nonterminal. Correct! vertical bar backward slash asterisk forward slash Question 121 / 1 pts A high-level language program is called a(n) ____ program. token Correct! source object lexical Question 130 / 1 pts A(n) ____ takes the bits in a string and changes the 1s to 0s and the 0s to 1s. You Answered Turing inverter Correct Answer bit inverter incrementer unary converter Question 141 / 1 pts In binary representation, any unsigned whole number n is encoded by a sequence of n + 1 1s. _________________________ True Correct! False Question 151 / 1 pts The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine to do that task. Correct! Church-Turing thesis Church-Alan theorem Church-Zimmerman thesis Alan-Zimmerman thesis Question 160 / 1 pts The Turing machine contains a single unit for both input and output. Correct Answer True You Answered False Question 170 / 1 pts ____ consists of looking for ways to convert the data to other forms or to different units that will make the display easier to understand and interpret. Data distribution Data analysis You Answered Data interpretation Correct Answer Data manipulation Question 180 / 1 pts We can experiment on the model and use these results to understand the behavior of the actual system. You Answered False Correct Answer True Question 190 / 1 pts If we know the ____, then the computer can generate a sequence of random numbers that follows this pattern, and this sequence accurately models the time it takes to serve customers in real life. normalized distribution random distribution Correct Answer statistical distribution You Answered probabilistic distribution Question 201 / 1 pts A random integer v that takes on one of the values 1, 2, 3, . . . , 100 with equal likelihood is called a ____. Correct! uniform random number predictable random number pseudo random number deterministic random number Question 210 / 1 pts Each record in a file contains information about an item in the "universe of discourse" that the file describes. Correct Answer True You Answered False Question 220 / 1 pts ____ is an online coupon site. Correct Answer Groupon iTunes You Answered Craigslist PayPal Question 230 / 1 pts Encryption is the method in which data are protected during a transaction._________________________ You Answered False Correct Answer True Question 241 / 1 pts The number-one attraction to online shopping is probably ____. lower cost Correct! convenience the ability to view products speed Question 250 / 1 pts Any knowledge representation scheme we select must be relatively easy to extend to include new knowledge. You Answered False Correct Answer True Question 261 / 1 pts The term ____ means the language of formal logic. Correct! formal language logic scheme natural language graphical scheme Question 270 / 1 pts In a neural network, both the knowledge representation and also the "programming" are stored in the network itself as the weights of the connections and the thresholds of the neurons. You Answered False Correct Answer True Question 280 / 1 pts A __________ is presented with training data, for which the correct outputs are known. You Answered machine learning network cognitive network Correct Answer neural network Turing network Question 290 / 1 pts Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is separate from primary memory. You Answered CPU Correct Answer GPU MPU PPU Question 300 / 1 pts The sequence of operations that must be completed successfully to produce a realistic three-dimensional image sequence is termed the ____. Correct Answer graphics pipeline You Answered graphics mode graphics perspective graphics streamline Question 310 / 1 pts The first commercially marketed computer was the UNIVAC I manufactured by _____________. Hewlitt-Packard Correct Answer Remington Rand You Answered International Business Machines (IBM) Dedicated Electronic Logical Logarithms (DELL) Question 320 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. Correct Answer True You Answered False Question 330 / 1 pts The final step of the paramedic method is to ____. You Answered think of analogies Correct Answer make a decision or revisit the steps identify what is at stake identify stakeholders Question 340 / 1 pts A ____ focuses on the consequences of an act to determine if the act is good or bad. dialectic universalist You Answered PGP Correct Answer consequentialist Question 350 / 1 pts Ethicists depend on what is called a ____ to try to make better and better ethical decisions. deontology You Answered categorical imperative Correct Answer dialectic reductionist argument

Question 11 / 1 pts ____ includes online tutorials or help systems that the user can bring up while the program is running, and (less often) written user's manuals. Technical documentation First-level documentation Correct! User documentation Rough documentation Question 20 / 1 pts Most programming languages are now presented within an ____. Correct Answer integrated development environment interactive development environment You Answered integrated deployment environment implementation development environment Question 31 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. object compiling Correct! assembly link Question 40 / 1 pts The problem identification document commits the final and complete problem specification to paper and guides the software developers in all subsequent decisions. You Answered False Correct Answer True Question 50 / 1 pts _________ code is freely available and can be used, distributed, or modified by anyone. Correct Answer Open source You Answered Free code Public domain Dynamic Question 61 / 1 pts FORTRAN does allow the use of external libraries. Correct! True False Question 71 / 1 pts Old computer code that is still in use is known as ____. spaghetti code portable code Y2K code Correct! legacy code Question 81 / 1 pts The task of finding the largest number in a list can be solved in a MIMD parallel fashion using the ____ model. piecewise stepwise Correct! divide-and-conquer distributed Question 90 / 1 pts In the ____ phase, the compiler takes the generated code and sees whether it can be made more efficient, either by making it run faster or having it occupy less memory. parsing You Answered lexical analysis semantic analysis and code generation Correct Answer code optimization Question 100 / 1 pts In the ____ phase, the compiler examines the individual characters in the source program and groups them into tokens. semantic analysis and code generation code optimization You Answered parsing Correct Answer lexical analysis Question 111 / 1 pts A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its data type. parse tree Correct! semantic record production rule Question 121 / 1 pts ____ begins at the productions in the tree that are nearest to the original input tokens. Correct! Code generation Semantic analysis Lexical analysis Parsing Question 130 / 1 pts Unsolvable problems related to the halting problem have the following practical consequence: ____. a program can be written to decide whether any given program always stops eventually, no matter what the input. Correct Answer no program can be written to decide whether any given program run on any given input will ever produce some specific output. You Answered a program can be written to decide whether any two programs are equivalent. a program can be written to decide whether any given program run on any given input will produce some specific output. Question 141 / 1 pts The equation for the distance d that a moving vehicle travels—the product of rate r and time t—is considered to be a model. False Correct! True Question 151 / 1 pts A(n) ____ takes the bits in a string and changes the 1s to 0s and the 0s to 1s. unary converter incrementer Correct! bit inverter Turing inverter Question 161 / 1 pts It's possible to compare the efficiency of a Turing machine algorithm with an algorithm that runs on a "real" computer. True Correct! False Question 170 / 1 pts Computational steering is usually feasible using physical models. _________________________ You Answered True Correct Answer False Question 180 / 1 pts A ____ is a representation of the system being studied, which we claim behaves much like the original. replica You Answered concept Correct Answer model problem Question 190 / 1 pts In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t. decomposed model Correct Answer continuous model You Answered unit model composite model Question 200 / 1 pts The throw of the dice or the drawing of a card, if looked at programmatically, may be considered a __________. You Answered stochastic component conventional component deterministic component Correct Answer static component Question 211 / 1 pts Related records are kept in a _________. file sheet Correct! data file data chain record file Question 220 / 1 pts ____ is the process of automatically analyzing large amounts of data to discover and interpret previously hidden patterns contained therein. Metadata searching Correct Answer Data mining You Answered Data warehousing Phishing Question 230 / 1 pts A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize access time to the records. You Answered special operating system service specialized file system simple file manager Correct Answer sophisticated file manager Question 240 / 1 pts A disk input/output (I/O) operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________ You Answered False Correct Answer True Question 251 / 1 pts A formal language representation has the disadvantage of extracting the essentials. True Correct! False Question 260 / 1 pts To be considered a robot, it must be in some way humanoid in design. You Answered True Correct Answer False Question 271 / 1 pts A brute force approach is commonly used for intelligent chess-playing strategy. True Correct! False Question 281 / 1 pts Proponents of the reactive strategy of robotics argue that a robot cannot react meaningfully without processing the stimulus and planning a reaction based on its internal representation of the environment. _________________________ Correct! False True Question 290 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. game hosts You Answered game clients Correct Answer game servers game servlets Question 300 / 1 pts The first commercially marketed computer was the UNIVAC I manufactured by _____________. International Business Machines (IBM) Hewlitt-Packard Correct Answer Remington Rand You Answered Dedicated Electronic Logical Logarithms (DELL) Question 310 / 1 pts The server software that creates the MMOG world is always running and always available, and it always remembers the current state of every player. _________________________ Correct Answer True You Answered False Question 320 / 1 pts A movie is an interactive environment. You Answered True Correct Answer False Question 331 / 1 pts Users had to find each other through the Internet and web before being able to connect and share with Napster. Correct! False True Question 340 / 1 pts "Sharing" of music and movies was rare prior to the popularity of high-speed Internet. You Answered True Correct Answer False Question 350 / 1 pts All musicians are naturally opposed to music file sharing. Correct Answer False You Answered True

Question 10 / 1 pts ____ takes place on each module (subtask code) as it is completed. Correct Answer Unit testing Regression testing You Answered Integration testing System testing Question 20 / 1 pts ____ is the process of translating the detailed designs into computer code. Correct Answer Coding Interpreting You Answered Translating Configuring Question 31 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. compiling object Correct! assembly link Question 40 / 1 pts Machine language is also known as ____ code. You Answered link reloadable source Correct Answer object Question 51 / 1 pts The task of finding the largest number in a list can be solved in a MIMD parallel fashion using the ____ model. distributed piecewise Correct! divide-and-conquer stepwise Question 61 / 1 pts Much of the processing in the business world concerns updating "transaction files" with changes from "master files." True Correct! False Question 71 / 1 pts With a suitable parallel processor, a search for the largest of 1,000,000 numbers requires (2*lgN), or ____ steps. 1 500 1,000,000 Correct! 40 Question 80 / 1 pts The use of parallelism always reduces processing time because subtasks are being executed concurrently. You Answered True Correct Answer False Question 91 / 1 pts A high-level language statement is translated into a single machine language instruction. Correct! False True Question 100 / 1 pts Performing local optimization is much more difficult than performing global optimization. Correct Answer False You Answered True Question 111 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. code optimization Correct! parsing OOP BNF Question 120 / 1 pts Following ____, the compiler makes a second pass over the parse tree to produce the translated code. code generation code optimization You Answered lexical analysis Correct Answer semantic analysis Question 130 / 1 pts An extra bit, called a(n) ____, can be attached to the end of a string of bits. You Answered sentinel bit inverted bit Correct Answer odd parity bit state bit Question 140 / 1 pts It is important to note that unsolvable problems related to the halting problem are unsolvable because of their ____. Correct Answer generality complexity You Answered specificity simplicity Question 150 / 1 pts Every problem has an algorithmic solution. You Answered True Correct Answer False Question 160 / 1 pts A(n) ____ takes the bits in a string and changes the 1s to 0s and the 0s to 1s. incrementer Turing inverter You Answered unary converter Correct Answer bit inverter Question 171 / 1 pts _______ is one of the most powerful and useful forms of scientific visualization. Image virtualization Image manipulation Correct! Image animation Image enhancement Question 181 / 1 pts Building a good model can be a difficult task that requires us to capture, in translational form, all the important factors that influence the behavior of a system. _________________________ Correct! False True Question 190 / 1 pts In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t. decomposed model unit model You Answered composite model Correct Answer continuous model Question 200 / 1 pts It is possible to discover the same features displayed in a graph from a textual representation of the output of a model, but it would probably take much more time. You Answered False Correct Answer True Question 210 / 1 pts To the user, distributed databases look like a single database, just with slightly slower access times. You Answered False Correct Answer True Question 220 / 1 pts The number-one attraction to online shopping is probably ____. Correct Answer convenience speed You Answered the ability to view products lower cost Question 230 / 1 pts A ____ is an attribute or combination of attributes that uniquely identifies a tuple. foreign key You Answered secondary key preferred key Correct Answer primary key Question 241 / 1 pts Authentication is the process of verifying the identity of the receiver of the data._________________________ Correct! True False Question 250 / 1 pts Complex recognition tasks are easy for computers to perform. Correct Answer False You Answered True Question 261 / 1 pts Computational tasks are tasks for which accurate answers need not be found. _________________________ Correct! False True Question 270 / 1 pts A __________ is presented with training data, for which the correct outputs are known. Correct Answer neural network You Answered machine learning network cognitive network Turing network Question 280 / 1 pts A(n) ____ is a form of software technology that is designed to interact collaboratively with a user somewhat in the mode of a personal assistant. Correct Answer intelligent agent You Answered wizard knowledge-based system rule-based system Question 290 / 1 pts Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a sequence, and the elapsed time. You Answered central cells (CC) Prolog algorithm Correct Answer first and last frame wire-frame Question 301 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. game hosts game clients Correct! game servers game servlets Question 311 / 1 pts In stop-motion animation, a single photograph is called a ____. cell block Correct! frame unit Question 321 / 1 pts A point or axis used to control the motion of an object is called a key point. _________________________ Correct! False True Question 330 / 1 pts An ethical dialectic usually has a clean stopping point. Correct Answer False You Answered True Question 341 / 1 pts Today, more than ____ U.S. households have no landline-based phone, and that percentage is growing rapidly. 15% Correct! 50% 25% 10% Question 351 / 1 pts All musicians are naturally opposed to music file sharing. Correct! False True

Question 10 / 1 pts The program implementation phase is the time to plan how it is to be done. _________________________ You Answered True Correct Answer False Question 20 / 1 pts Imperative commands are instructions in the _______. Correct Answer programming language You Answered assembly Language machine Language processing language Question 30 / 1 pts Assembly language programs are ____ specific. You Answered language Correct Answer machine compiler architecture Question 41 / 1 pts A ____ stores and fetches values to and from memory cells. memory cache encoder read-only memory flash memory Correct! random access memory Question 50 / 1 pts A device _______ is a program written to interact with an I/O device. Correct Answer translator You Answered object driver hook Question 61 / 1 pts Procedural languages act the same regard to the details of assigning a new value to a variable, in the mechanisms, the language provides for directing the flow of control through conditional and looping statements, and in the statement forms that control input and output. True Correct! False Question 70 / 1 pts A(n) ____ is a model or mental framework for representing or thinking about something. pyramid architecture You Answered stack Correct Answer paradigm Question 80 / 1 pts A ____ occurs when a function, in the course of acting on its argument values to produce a result value, also changes other values that it has no business changing. Secondary interface You Answered Side line Correct Answer Side effect Secondary routine Question 91 / 1 pts In BNF, the syntax of a language is specified as a series of rules. _________________________ Correct! True False Question 101 / 1 pts A BNF rule is also known as a token. True Correct! False Question 111 / 1 pts A high-level language statement is translated into a single machine language instruction. Correct! False True Question 121 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. code optimization OOP Correct! parsing BNF Question 131 / 1 pts The proof by ____ approach assumes that a specific Turing machine does exist and then shows that this assumption leads to an impossible situation. impossibility inference Correct! contradiction deduction Question 140 / 1 pts In binary representation, any unsigned whole number n is encoded by a sequence of n + 1 1s. _________________________ Correct Answer False You Answered True Question 150 / 1 pts Turing machines define the limits of ____, which is what can be done by symbol manipulation algorithms. correspondence compatibility You Answered extensibility Correct Answer computability Question 161 / 1 pts In any collection of Turing machine instructions, there can be two different instructions that both begin with the same current state and current symbol. Correct! False True Question 171 / 1 pts Computational steering is usually feasible using physical models. _________________________ True Correct! False Question 181 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. designer Correct! user engineer consumer Question 190 / 1 pts ____ is a design approach that says only when we think we have created the best design possible would we actually build it. You Answered Computational decomposition Computational analysis Computational methodology Correct Answer Computational steering Question 200 / 1 pts ____ consists of looking for ways to convert the data to other forms or to different units that will make the display easier to understand and interpret. Data interpretation Correct Answer Data manipulation You Answered Data distribution Data analysis Question 210 / 1 pts Each category of information in a database is called a(n) ____. element entity You Answered tuple Correct Answer attribute Question 221 / 1 pts A ____ runs Bitcoin software that verifies (using a hash function) that the blockchain has not been altered in any way since the previous transaction, and for this service, the miner is rewarded with new bitcoins. Groupon bot Correct! bitcoin miner dumpster diver virtual currency specialist Question 231 / 1 pts Opening an online store requires at least the same amount of planning than building another physical store location. Correct! True False Question 240 / 1 pts To the user, distributed databases look like a single database, just with slightly slower access times. You Answered False Correct Answer True Question 250 / 1 pts Cause and effect relationships are translated into "for every" statements. _________________________ You Answered True Correct Answer False Question 260 / 1 pts The Turing test is used to determine if a machine exhibits behavior indistinguishable from __________. You Answered another machine an insect a rodent Correct Answer a human Question 270 / 1 pts ____ begins with assertions and tries to match those assertions to the "if" clauses of rules. Knowledge engineering You Answered Backward chaining Correct Answer Forward chaining Decision making Question 280 / 1 pts A(n) ____ contains facts about a specific subject domain to narrow the scope to a manageable size. Correct Answer knowledge base You Answered modus ponens explanation facility intelligent agent Question 290 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. You Answered game servlets Correct Answer game servers game clients game hosts Question 300 / 1 pts In 1965, Digital Equipment Corp. (DEC) rolled out the _______, the world's first "minicomputer." DEC Mark IV You Answered UNIVAC II JDI Force Correct Answer PDP-8 Question 310 / 1 pts A movie is an interactive environment. You Answered True Correct Answer False Question 321 / 1 pts The server software that creates the MMOG world is always running and always available, and it always remembers the current state of every player. _________________________ Correct! True False Question 330 / 1 pts A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism. Correct Answer hacker You Answered PGP utilitarian encryption Question 341 / 1 pts ____ calls can be made from any place that the user can get an Internet connection. MP3 FTP Correct! VoIP Linux Question 350 / 1 pts ____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others. You Answered Utilitarian Consequentialist Hacker Correct Answer Deontological

Question 11 / 1 pts Procedural languages are also called ____ languages. immediate Correct! imperative translated interpreted Question 20 / 1 pts Maintenance should be viewed as a separate step in the software development life cycle. _________________________ Correct Answer False You Answered True Question 30 / 1 pts Which language does NOT require a semicolon to terminate an executable program statement? Ada C# You Answered C++ Correct Answer Python Question 40 / 1 pts A program written in a(n) procedural language consists of sequences of statements that manipulate data items. _________________________ You Answered False Correct Answer True Question 51 / 1 pts Although C++ supports the basic arithmetic operations of addition, subtraction, multiplication, and division by providing simple operators (+, −, *, /) to do these tasks, there is no operator for exponentiation—that is, raising a value to a power. False Correct! True Question 60 / 1 pts A ____ occurs when a function, in the course of acting on its argument values to produce a result value, also changes other values that it has no business changing. Secondary interface You Answered Secondary routine Correct Answer Side effect Side line Question 71 / 1 pts Writing all computer programs in the same programming language would be more efficient because all languages meet essentially the same needs. True Correct! False Question 80 / 1 pts Java is the language used to frame database queries. _________________________ Correct Answer False You Answered True Question 91 / 1 pts During parsing, a compiler deals only with the ____ of a statement. rules semantics grammar Correct! syntax Question 101 / 1 pts The right-hand side of a BNF rule is the name of a single grammatical category. True Correct! False Question 111 / 1 pts A high-level language statement is translated into a single machine language instruction. Correct! False True Question 120 / 1 pts ____ is where the compiler polishes and fine-tunes the translation so that it runs a little faster or occupies a little less memory. Correct Answer Optimization You Answered Compilation Generation Efficiency Question 130 / 1 pts A formal basis for mathematical proofs guarantees the presence of intuitive statements. You Answered True Correct Answer False Question 140 / 1 pts The bit inverter Turing machine should have two states. _________________________ You Answered True Correct Answer False Question 151 / 1 pts A formal basis for proofs might allow for ____ theorem-proving. observable unsolvable Correct! mechanical indisputable Question 160 / 1 pts A Turing machine can produce output on the same tape upon which the input exists. Correct Answer True You Answered False Question 171 / 1 pts Some physical models have serious moral and ethical consequences. Correct! True False Question 180 / 1 pts One way to discover a pattern is to know something about the statistical distribution of quantities that behave in a similar way. _________________________ You Answered False Correct Answer True Question 191 / 1 pts Computational steering is usually feasible using physical models. _________________________ True Correct! False Question 201 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. designer consumer Correct! user engineer Question 211 / 1 pts ____ is the process of automatically analyzing large amounts of data to discover and interpret previously hidden patterns contained therein. Phishing Correct! Data mining Data warehousing Metadata searching Question 221 / 1 pts Authentication is the process of verifying the identity of the receiver of the data._________________________ Correct! True False Question 231 / 1 pts A disk input/output (I/O) operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________ Correct! True False Question 240 / 1 pts ____ allow the physical data to reside at separate and independent locations that are electronically networked together. You Answered Normalized databases Discrete databases Correct Answer Distributed databases Singleton databases Question 250 / 1 pts A ____ takes us from the initial state to a winning configuration, and the graph nodes along the way represent the intermediate configurations. You Answered brute force approach state-space graph heuristic Correct Answer solution path Question 260 / 1 pts ____ is a well-known humanoid robot built by Honda Motor Company. Correct Answer ASIMO CIVIC ROBOTO You Answered ISSAC Question 270 / 1 pts A(n) ____ begins to not merely wait for user commands but initiates communication, takes action, and performs tasks on its own on the basis of its increasing knowledge of your needs and preferences. wizard You Answered computer personal assistant Correct Answer intelligent agent personalized web server Question 280 / 1 pts Computational tasks are tasks for which accurate answers need not be found. _________________________ You Answered True Correct Answer False Question 290 / 1 pts ____ is a rapidly growing area of computer and biological science research in which computers and graphics software are used to produce highly accurate two- and three-dimensional images of the human body. Visual medicine Correct Answer Medical imaging You Answered Virtual medicine Medical processing Question 300 / 1 pts Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is separate from primary memory. Correct Answer GPU MPU You Answered CPU PPU Question 310 / 1 pts ____ games allow a large number of players, often thousands or tens of thousands, to interact, form groups, and compete against one another within a simulated virtual world. MMRPG MMORG Correct Answer MMOG You Answered MMPRG Question 321 / 1 pts Using information technology to amuse, fascinate, and frighten is still viewed as a waste of time by most people. Correct! False True Question 330 / 1 pts Napster lost the case accusing it of copyright infringement but won subsequent appeals. Correct Answer False You Answered True Question 341 / 1 pts The "hacker ethic" makes the claim that ____. Correct! information sharing is a powerful positive good hacking is acceptable as long as it is a solitary activity hackers are ethically ok as long as they have fun all hacking is positive hacking Question 351 / 1 pts The Napster software set up what's called ____ file sharing. client-server freeware Correct! peer-to-peer MP3

Fortran

READ is the __________ implementation of "input."

1

State ____ is always the start-up state of the Turing machine.

statements

Syntax is the rules for exactly how _______ must be written in a programming language.

In assembly language, the programmer need not manage the details of the movement of data items within memory. Correct! False True Question 20 / 1 pts ____ takes place on each module (subtask code) as it is completed. You Answered Integration testing System testing Correct Answer Unit testing Regression testing Question 31 / 1 pts A ____ stores and fetches values to and from memory cells. read-only memory memory cache encoder Correct! random access memory flash memory Question 40 / 1 pts Rapid prototyping allows _______ between the user and the programmer to be identified and corrected early in the development process. You Answered interfacing errors processing errors Correct Answer miscommunications config errors Question 50 / 1 pts Early versions of FORTRAN did not include a while loop mechanism. _________________________ Correct Answer True You Answered False Question 61 / 1 pts Java ____ are programs designed to run from webpages. applications Correct! applets beans grounds Question 71 / 1 pts C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________ Correct! False True Question 80 / 1 pts C++ is in fact a "subset" of C, meaning that all of the C++ language is part of C. Correct Answer False You Answered True Question 91 / 1 pts Performing local optimization is much more difficult than performing global optimization. True Correct! False Question 101 / 1 pts During parsing, a compiler deals only with the ____ of a statement. rules grammar Correct! syntax semantics Question 110 / 1 pts A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its data type. Correct Answer semantic record You Answered rule parse tree production Question 121 / 1 pts Online debuggers help programmers locate and correct errors in programs. False Correct! True Question 130 / 1 pts The Turing machine contains a single unit for both input and output. Correct Answer True You Answered False Question 140 / 1 pts A Turing machine ____ is a collection of instructions that allow a Turing machine to carry out a certain task. Correct Answer program You Answered tape algorithm sequence Question 150 / 1 pts The equation for the distance d that a moving vehicle travels—the product of rate r and time t—is considered to be a model. You Answered False Correct Answer True Question 160 / 1 pts The model of a phenomenon does not need to capture the full functionality of the real thing. Correct Answer True You Answered False Question 171 / 1 pts It is certainly a lot easier to work with a numerical description of data than a visualization. Correct! False True Question 180 / 1 pts The field of ____ is concerned with the issue of how to visualize data in a way that highlights its important characteristics and simplifies its interpretation. numeric visualization You Answered numerical simulation scientific simulation Correct Answer scientific visualization Question 190 / 1 pts In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t. You Answered composite model decomposed model unit model Correct Answer continuous model Question 201 / 1 pts Building a good model can be a difficult task that requires us to capture, in translational form, all the important factors that influence the behavior of a system. _________________________ Correct! False True Question 210 / 1 pts Encryption is the method in which data are protected during a transaction._________________________ Correct Answer True You Answered False Question 220 / 1 pts Opening an online store requires at least the same amount of planning than building another physical store location. You Answered False Correct Answer True Question 231 / 1 pts To the user, distributed databases look like a single database, just with slightly slower access times. False Correct! True Question 241 / 1 pts Services such as Apple Pay and PayPal are examples of __________. data-driven payment systems network-based payment systems automated payment systems Correct! electronic payment systems Question 250 / 1 pts Computers are better than humans where there seems to be a high level of complexity, approximation, or ambiguity. Correct Answer False You Answered True Question 260 / 1 pts A ____ for a search algorithm illustrates the possible next choices of items to search if the current item is not the target. Set of training data You Answered connectionist architecture back propagation algorithm Correct Answer decision tree Question 270 / 1 pts ____ is the study of how we as humans think and learn. Correct Answer Cognitive science Artificial intelligence You Answered Neuroscience Social science Question 280 / 1 pts Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences. You Answered back propagation brute force Correct Answer heuristic swarm intelligence Question 290 / 1 pts Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is separate from primary memory. You Answered CPU PPU MPU Correct Answer GPU Question 300 / 1 pts Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a sequence, and the elapsed time. Correct Answer first and last frame Prolog algorithm You Answered wire-frame central cells (CC) Question 310 / 1 pts The process of "move the model, shoot a frame" was repeated thousands of times when filming King Kong. Correct Answer True You Answered False Question 320 / 1 pts With a GPU, all imaging responsibilities are offloaded from the GPU to the CPU. You Answered True Correct Answer False Question 330 / 1 pts What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE? Evil You Answered Good Not relevant Correct Answer Ethically neutral Question 341 / 1 pts ____ calls can be made from any place that the user can get an Internet connection. FTP MP3 Linux Correct! VoIP Question 350 / 1 pts The philosopher ____ was known to say "never treat a fellow human merely as a means to an end." You Answered Descartes Aristotle Turing Correct Answer Kant

Syntax is the rules for exactly how _______ must be written in a programming language. orders Correct! statements instructions executables Question 20 / 1 pts Program maintenance, the process of adapting an existing software product, may consume as much as 85% of the total software development life cycle budget. You Answered True Correct Answer False Question 31 / 1 pts ____ is the process of translating the detailed designs into computer code. Interpreting Translating Correct! Coding Configuring Question 40 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. link object You Answered compiling Correct Answer assembly Question 50 / 1 pts ____ is the most widely used language for writing system software because it combines the power of a high-level language with the ability to circumvent that level of abstraction and work at the assembly-language-like level. Java Correct Answer C You Answered C++ Pascal Question 60 / 1 pts C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________ You Answered True Correct Answer False Question 71 / 1 pts Old computer code that is still in use is known as ____. Y2K code portable code spaghetti code Correct! legacy code Question 80 / 1 pts READ is the __________ implementation of "input." You Answered C++ Cobol Correct Answer Fortran C# Question 90 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. Correct Answer parsing OOP You Answered code optimization BNF Question 100 / 1 pts Performing local optimization is much more difficult than performing global optimization. Correct Answer False You Answered True Question 110 / 1 pts A grammar that allows the construction of two or more distinct parse trees for the same statement is called a recursive grammar. You Answered True Correct Answer False Question 120 / 1 pts The goal symbol is the final nonterminal. You Answered False Correct Answer True Question 130 / 1 pts A formal basis for proofs might allow for ____ theorem-proving. Correct Answer mechanical unsolvable You Answered indisputable observable Question 141 / 1 pts Every problem has an algorithmic solution. True Correct! False Question 150 / 1 pts Turing machines define the limits of ____, which is what can be done by symbol manipulation algorithms. Correct Answer computability compatibility You Answered extensibility correspondence Question 161 / 1 pts The equation for the distance d that a moving vehicle travels—the product of rate r and time t—is considered to be a model. False Correct! True Question 171 / 1 pts Scientists often work with a model of a system rather than experimenting on the "real thing." Correct! True False Question 181 / 1 pts The very essence of randomness is that we can never know what event will occur next. _________________________ False Correct! True Question 191 / 1 pts Simulation model is another term for ___________ model. situation replication Correct! computational reproduction Question 200 / 1 pts A model of a business in which customers walk into the store at random times employs a model that uses ____ rather than precise and exact equations. You Answered algebraic approximations Correct Answer statistical approximations probabilistic approximations numerical approximations Question 210 / 1 pts The number-one attraction to online shopping is probably ____. You Answered lower cost Correct Answer convenience the ability to view products speed Question 220 / 1 pts Opening an online store requires at least the same amount of planning than building another physical store location. You Answered False Correct Answer True Question 230 / 1 pts The term __________ expresses that we now have huge amounts of data available. large data data warehouse You Answered data store Correct Answer big data Question 240 / 1 pts ____ is an online coupon site. PayPal iTunes You Answered Craigslist Correct Answer Groupon Question 250 / 1 pts A(n) ____, also called an expert system, attempts to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion. Correct Answer rule-based system inference engine intelligent agent You Answered back propagation system Question 260 / 1 pts ____ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems. Neural networks Correct Answer Artificial intelligence Internet technology You Answered Database technology Question 271 / 1 pts In a neural network, both the knowledge representation and also the "programming" are stored in the network itself as the weights of the connections and the thresholds of the neurons. Correct! True False Question 280 / 1 pts A(n) ____ begins to not merely wait for user commands but initiates communication, takes action, and performs tasks on its own on the basis of its increasing knowledge of your needs and preferences. wizard You Answered computer personal assistant Correct Answer intelligent agent personalized web server Question 290 / 1 pts Conditions in the computing environment changed dramatically in the late 1960s due to the development of ________ and integrated circuits. silicon chips Correct Answer transistors You Answered parallel CPUs dedicated GPUs Question 301 / 1 pts In stop-motion animation, a single photograph is called a ____. unit Correct! frame block cell Question 311 / 1 pts On March 31, 1952, the UNIVAC I was delivered to the ____. Correct! U.S. Census Bureau General Electric U.S. Army Atomic Energy Commission Question 320 / 1 pts A movie is an interactive environment. You Answered True Correct Answer False Question 331 / 1 pts What would a careful utilitarian declare an act if HAPPINESS_AFTER = HAPPINESS_BEFORE? Good Correct! Ethically neutral Not relevant Evil Question 340 / 1 pts In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each. utilitarian scheme Correct Answer dialectic You Answered encryption scheme PGP Question 351 / 1 pts The Napster software set up what's called ____ file sharing. freeware Correct! peer-to-peer client-server MP3

the null string

The Greek character lambda represents ___.

False

The SQL command to create a table only requires specification of the various attributes by name and data type.

feasibility study

The ____ evaluates a proposed project and compares the costs and benefits of various solutions.

_______ is the time to plan how the program will accomplish the determined task. Program design Processing design Correct! Program statement document Assembly design Question 21 / 1 pts The programmer's task is to devise the appropriate step-by-step sequence of "imperative commands" that, when carried out by the computer, accomplish the desired task. False Correct! True Question 31 / 1 pts A modern programming EXE provides a text editor, a file manager, a compiler, a linker and loader, and tools for debugging, all within this one piece of software. _________________________ Correct! False True Question 40 / 1 pts Rapid prototyping allows _______ between the user and the programmer to be identified and corrected early in the development process. config errors You Answered interfacing errors processing errors Correct Answer miscommunications Question 50 / 1 pts Compared to functional programming, ____ goes a step further toward not specifying exactly how a task is to be done. Correct Answer logic programming You Answered logic interfacing logic outlining logic structuring Question 60 / 1 pts Logic programming languages are sometimes called declarative languages. _________________________ Correct Answer True You Answered False Question 71 / 1 pts ____ was the first high-level programming language that was actually implemented. COBOL Correct! FORTRAN PL-1 BASIC Question 81 / 1 pts Old computer code that is still in use is known as ____. portable code spaghetti code Y2K code Correct! legacy code Question 91 / 1 pts A BNF rule is also known as a token. Correct! False True Question 101 / 1 pts In the ____ phase, the compiler examines the individual characters in the source program and groups them into tokens. semantic analysis and code generation Correct! lexical analysis parsing code optimization Question 111 / 1 pts A high-level language program is called a(n) ____ program. lexical Correct! source token object Question 120 / 1 pts The English-language sentence, "The orange artichoke flew through the pink eight-legged elephant" is semantically meaningful. _________________________ You Answered True Correct Answer False Question 131 / 1 pts The model of a phenomenon does not need to capture the full functionality of the real thing. False Correct! True Question 141 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ Correct! False True Question 150 / 1 pts If a Turing machine program consists of the following four instructions: (1,0,1,2,R) (1,1,0,2,R) (2,0,0,2,R) (2,b,b,2,L) then the configuration ____ is a halting configuration. Correct Answer ... b 1 1 b b b ... (current state = 2, symbol 1 is being read) ... b 1 0 b b b ... (current state = 2, symbol 0 is being read) You Answered ... b 1 1 b b b ... (current state = 1, symbol 1 is being read) ... b 1 0 b b b ... (current state = 1, symbol 0 is being read) Question 161 / 1 pts In binary representation, any unsigned whole number n is encoded by a sequence of n + 1 1s. _________________________ True Correct! False Question 170 / 1 pts The dictum ____ says that the results you get out of a simulation model are only as good as the data and the assumptions put into the model. Correct Answer garbage in, garbage out last in, last out You Answered first in, first out first in, last out Question 180 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. consumer You Answered engineer Correct Answer user designer Question 190 / 1 pts The field of ____ is concerned with the issue of how to visualize data in a way that highlights its important characteristics and simplifies its interpretation. Correct Answer scientific visualization You Answered numerical simulation numeric visualization scientific simulation Question 200 / 1 pts The clever use of visual enhancements such as ____ can make an enormous difference in how easy or hard it is to interpret the output of a computer model. You Answered color and time size and time Correct Answer color and scale size and perspective Question 211 / 1 pts A disk input/output (I/O) operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________ Correct! True False Question 220 / 1 pts Opening an online store requires at least the same amount of planning than building another physical store location. You Answered False Correct Answer True Question 231 / 1 pts Services such as Apple Pay and PayPal are examples of __________. automated payment systems network-based payment systems data-driven payment systems Correct! electronic payment systems Question 240 / 1 pts Each category of information in a database is called a(n) ____. Correct Answer attribute You Answered element tuple entity Question 251 / 1 pts Computational tasks are tasks for which accurate answers need not be found. _________________________ True Correct! False Question 260 / 1 pts A formal language representation has the disadvantage of extracting the essentials. You Answered True Correct Answer False Question 271 / 1 pts We seek to perform a(n) ____ to find a solution path through the graph. intelligent search Correct! state-space search decision tree search graph traversal Question 281 / 1 pts ____ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems. Internet technology Database technology Correct! Artificial intelligence Neural networks Question 290 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. You Answered game clients game hosts Correct Answer game servers game servlets Question 300 / 1 pts With a GPU, all imaging responsibilities are offloaded from the GPU to the CPU. You Answered True Correct Answer False Question 310 / 1 pts Users log on to the MMOG game server whenever they wish, using ____ software running on their home computer or laptop. You Answered servlet server hosting Correct Answer client Question 321 / 1 pts King Kong's movements in the 1933 film were created using a manual technique called ____. film overlay skip-motion animation Correct! stop-motion animation CGI Question 330 / 1 pts The first step in the paramedic method is to ____. identify duties and responsibilities Correct Answer identify stakeholders ask what is at stake You Answered think of analogies Question 341 / 1 pts ____ answer the question "Good for whom?" with a hearty, "Good for everyone!" Intelligent agents Deontologists Consequentialists Correct! Utilitarians Question 351 / 1 pts BitTorrent is the most popular current peer-to-peer file sharing system and accounts for 5% of all Internet traffic._________________________ False Correct! True

The ______ code for a task that needs to be performed often can be stored in a code library processing Correct Answer object You Answered assembly container Question 2 1 / 1 pts Syntax is the rules for exactly how _______ must be written in a programming language. executables Correct! statements instructions orders Question 3 0 / 1 pts In a high-level language, the programmer's only responsibilities for managing data items are to declare (or in the case of Python, create) all constants and variables the program will use. You Answered False Correct Answer True Question 4 1 / 1 pts In early programming languages, conserving machine resources was not an issue. Correct! False True Question 5 1 / 1 pts A ____ occurs when a function, in the course of acting on its argument values to produce a result value, also changes other values that it has no business changing. Secondary interface Side line Correct! Side effect Secondary routine Question 6 1 / 1 pts A ____ expresses a property about a single object or a relationship among several objects. Prolog query Correct! Prolog fact Prolog fallacy Prolog rule Question 7 0 / 1 pts Compared to functional programming, ____ goes a step further toward not specifying exactly how a task is to be done. logic outlining You Answered logic interfacing Correct Answer logic programming logic structuring Question 8 1 / 1 pts ____ was the first high-level programming language that was actually implemented. COBOL PL-1 BASIC Correct! FORTRAN Question 9 1 / 1 pts A high-level language statement is translated into a single machine language instruction. Correct! False True Question 10 0 / 1 pts The English-language sentence, "The orange artichoke flew through the pink eight-legged elephant" is semantically meaningful. _________________________ Correct Answer False You Answered True Question 11 0 / 1 pts A ____ shows how individual tokens can be grouped into predefined grammatical categories until the desired goal is reached. Correct Answer parse tree You Answered parser scanner compiler Question 12 1 / 1 pts The goal symbol is the final nonterminal. False Correct! True Question 13 0 / 1 pts Each time a Turing machine operation is done, three actions take place. _________________________ Correct Answer True You Answered False Question 14 0 / 1 pts The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine to do that task. Correct Answer Church-Turing thesis You Answered Church-Alan theorem Alan-Zimmerman thesis Church-Zimmerman thesis Question 15 1 / 1 pts The Turing machine must execute instructions in the order that the instructions are numbered. Correct! False True Question 16 1 / 1 pts We assumed that there was a Turing machine that could solve the halting problem, and this assumption led to a(n) ____. complex solution Correct! impossible situation computable problem unsolved problem Question 17 0 / 1 pts The field of ____ is concerned with the issue of how to visualize data in a way that highlights its important characteristics and simplifies its interpretation. scientific simulation You Answered numerical simulation numeric visualization Correct Answer scientific visualization Question 18 1 / 1 pts Some physical models have serious moral and ethical consequences. False Correct! True Question 19 0 / 1 pts A random integer v that takes on one of the values 1, 2, 3, . . . , 100 with equal likelihood is called a ____. Correct Answer uniform random number pseudo random number You Answered predictable random number deterministic random number Question 20 0 / 1 pts A ____ is one of the most popular and widely used techniques for building computer models. You Answered general event simulation discrete event analysis Correct Answer discrete event simulation disconnected event simulation Question 21 0 / 1 pts The term __________ expresses that we now have huge amounts of data available. You Answered data warehouse Correct Answer big data large data data store Question 22 0 / 1 pts To the user, distributed databases look like a single database, just with slightly slower access times. Correct Answer True You Answered False Question 23 1 / 1 pts An ____ will, for a fee, design your website and manage it on an ongoing basis. application manager application hosting provider application management provider Correct! application service provider Question 24 0 / 1 pts Each record in a file contains information about an item in the "universe of discourse" that the file describes. Correct Answer True You Answered False Question 25 0 / 1 pts To be considered a robot, it must be in some way humanoid in design. You Answered True Correct Answer False Question 26 0 / 1 pts ____ is a well-known humanoid robot built by Honda Motor Company. ISSAC Correct Answer ASIMO ROBOTO You Answered CIVIC Question 27 1 / 1 pts ____ is the study of how we as humans think and learn. Social science Correct! Cognitive science Neuroscience Artificial intelligence Question 28 0 / 1 pts ____ begins with assertions and tries to match those assertions to the "if" clauses of rules. Backward chaining Decision making Correct Answer Forward chaining You Answered Knowledge engineering Question 29 1 / 1 pts King Kong's movements in the 1933 film were created using a manual technique called ____. Correct! stop-motion animation film overlay CGI skip-motion animation Question 30 1 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. Correct! True False Question 31 1 / 1 pts Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is separate from primary memory. Correct! GPU MPU PPU CPU Question 32 1 / 1 pts In stop-motion animation, a single photograph is called a ____. unit Correct! frame cell block Question 33 0 / 1 pts The word ____ is from the Greek and means "the study of duty." Correct Answer deontology hacker You Answered modus ponens encryption Question 34 0 / 1 pts The philosopher ____ was known to say "never treat a fellow human merely as a means to an end." Turing Correct Answer Kant Aristotle You Answered Descartes Question 35 1 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. Apple Music Experience iTunes Music Store AppleOne Music Correct! iAlbums digital store

decision tree

A ____ for a search algorithm illustrates the possible next choices of items to search if the current item is not the target.

False

All musicians are naturally opposed to music file sharing.

True

Any knowledge representation scheme we select must be relatively easy to extend to include new knowledge.

False

Every problem has an algorithmic solution.

assembly

High-level programming languages were created to overcome the deficiencies of _______ language.

False

In 1952, a UNIVAC I cost $100 million.

object

Machine language is also known as ____ code.

False

Models can only give us information about existing phenomena.

legacy code

Old computer code that is still in use is known as ____.

True

Online debuggers help programmers locate and correct errors in programs.

False

Program maintenance, the process of adapting an existing software product, may consume as much as 85% of the total software development life cycle budget.

Question 11 / 1 pts Program maintenance, the process of adapting an existing software product, may consume as much as 85% of the total software development life cycle budget. Correct! False True Question 20 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. compiling You Answered link object Correct Answer assembly Question 31 / 1 pts The program implementation phase is the time to plan how it is to be done. _________________________ True Correct! False Question 40 / 1 pts In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. subtasks tasks You Answered programs Correct Answer memory locations Question 51 / 1 pts C# offers a feature called garbage collection that automatically reclaims memory no longer needed by the program. False Correct! True Question 60 / 1 pts A ____ expresses a property about a single object or a relationship among several objects. Prolog query You Answered Prolog fallacy Prolog rule Correct Answer Prolog fact Question 71 / 1 pts With a suitable parallel processor, a search for the largest of 1,000,000 numbers requires (2*lgN), or ____ steps. 500 1 1,000,000 Correct! 40 Question 81 / 1 pts Logic programming languages are sometimes called declarative languages. _________________________ False Correct! True Question 90 / 1 pts A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its data type. rule Correct Answer semantic record You Answered production parse tree Question 101 / 1 pts The singular goal of compilers is correctness. Correct! False True Question 110 / 1 pts ____ is the ability to write highly optimized programs that contain no wasted time or unnecessary memory cells. You Answered Ambiguity Correct Answer Efficiency Code-aware Conciseness Question 120 / 1 pts A ____ shows how individual tokens can be grouped into predefined grammatical categories until the desired goal is reached. You Answered scanner Correct Answer parse tree parser compiler Question 131 / 1 pts It's possible to compare the efficiency of a Turing machine algorithm with an algorithm that runs on a "real" computer. True Correct! False Question 140 / 1 pts The proof by ____ approach assumes that a specific Turing machine does exist and then shows that this assumption leads to an impossible situation. deduction You Answered impossibility Correct Answer contradiction inference Question 150 / 1 pts The bit inverter Turing machine should have two states. _________________________ Correct Answer False You Answered True Question 161 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ Correct! False True Question 170 / 1 pts A random integer v that takes on one of the values 1, 2, 3, . . . , 100 with equal likelihood is called a ____. pseudo random number deterministic random number You Answered predictable random number Correct Answer uniform random number Question 181 / 1 pts In a computer simulation, a physical system is modeled as a set of mathematical equations and/or algorithmic procedures that capture the fundamental characteristics and behavior of a system. _________________________ False Correct! True Question 191 / 1 pts Computational steering is usually feasible using physical models. _________________________ True Correct! False Question 200 / 1 pts In a ____, we write out a set of explicit mathematical equations that describes the behavior of a system as a continuous function of time t. Correct Answer continuous model unit model You Answered decomposed model composite model Question 210 / 1 pts ____ allow the physical data to reside at separate and independent locations that are electronically networked together. Correct Answer Distributed databases Discrete databases You Answered Singleton databases Normalized databases Question 221 / 1 pts A disk input/output (I/O) operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________ False Correct! True Question 230 / 1 pts Opening an online store requires at least the same amount of planning than building another physical store location. You Answered False Correct Answer True Question 240 / 1 pts Each category of information in a database is called a(n) ____. tuple You Answered element Correct Answer attribute entity Question 250 / 1 pts A(n) ____, also called an expert system, attempts to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion. back propagation system intelligent agent You Answered inference engine Correct Answer rule-based system Question 260 / 1 pts A neuron is a cell capable of receiving stimuli, in the form of sensory input, from other neurons through its many dendrites. Correct Answer False You Answered True Question 271 / 1 pts ____ begins with assertions and tries to match those assertions to the "if" clauses of rules. Knowledge engineering Correct! Forward chaining Decision making Backward chaining Question 281 / 1 pts A ____ for a search algorithm illustrates the possible next choices of items to search if the current item is not the target. Set of training data Correct! decision tree back propagation algorithm connectionist architecture Question 290 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. You Answered False Correct Answer True Question 300 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. game clients You Answered game hosts game servlets Correct Answer game servers Question 310 / 1 pts ____ games allow a large number of players, often thousands or tens of thousands, to interact, form groups, and compete against one another within a simulated virtual world. MMPRG Correct Answer MMOG You Answered MMRPG MMORG Question 320 / 1 pts In 1952, a UNIVAC I cost $100 million. You Answered True Correct Answer False Question 330 / 1 pts The first step in the paramedic method is to ____. Correct Answer identify stakeholders You Answered ask what is at stake think of analogies identify duties and responsibilities Question 340 / 1 pts Ethicists depend on what is called a ____ to try to make better and better ethical decisions. deontology You Answered reductionist argument Correct Answer dialectic categorical imperative Question 350 / 1 pts The most well-known consequentialists are the neo-Luddites. _________________________ ​ You Answered True Correct Answer False

Question 10 / 1 pts Even though a high-level programming language allows the programmer to think of memory locations in abstract rather than physical terms, the programmer is still directing, via program instructions, every change in the value of a memory location. Correct Answer True You Answered False Question 20 / 1 pts Which language does NOT require a semicolon to terminate an executable program statement? Correct Answer Python C# Ada You Answered C++ Question 31 / 1 pts Machine language is also known as ____ code. link Correct! object source reloadable Question 40 / 1 pts Imperative commands are instructions in the _______. Correct Answer programming language You Answered assembly Language processing language machine Language Question 50 / 1 pts Much of the processing in the business world concerns updating "transaction files" with changes from "master files." You Answered True Correct Answer False Question 61 / 1 pts Old computer code that is still in use is known as ____. Correct! legacy code portable code spaghetti code Y2K code Question 70 / 1 pts Using a single processor, finding the largest of N numbers takes ____ time. Correct Answer θ(N) You Answered θ(NlogN) θ(N2) θ(1) Question 80 / 1 pts The use of parallelism always reduces processing time because subtasks are being executed concurrently. You Answered True Correct Answer False Question 90 / 1 pts In the ____ phase, the compiler examines the individual characters in the source program and groups them into tokens. Correct Answer lexical analysis parsing code optimization You Answered semantic analysis and code generation Question 100 / 1 pts Building two parse trees implies that the parser has demonstrated correctness in two different ways. _________________________ You Answered False Correct Answer True Question 110 / 1 pts The singular goal of compilers is correctness. Correct Answer False You Answered True Question 120 / 1 pts During the parsing phase, the sequence of tokens formed by the scanner is checked to see whether it is _________ correct according to the rules of the programming language. grammatically You Answered algorithmically Correct Answer syntactically always Question 131 / 1 pts The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine to do that task. Church-Zimmerman thesis Church-Alan theorem Correct! Church-Turing thesis Alan-Zimmerman thesis Question 140 / 1 pts It's possible to compare the efficiency of a Turing machine algorithm with an algorithm that runs on a "real" computer. You Answered True Correct Answer False Question 151 / 1 pts The term unary means that we will use ____ symbol(s). two three four Correct! one Question 160 / 1 pts Every problem has an algorithmic solution. You Answered True Correct Answer False Question 170 / 1 pts The use of ____ becomes even more important as the amount of output increases and grows more complex. models You Answered data Correct Answer visualizations renderings Question 180 / 1 pts If we know the ____, then the computer can generate a sequence of random numbers that follows this pattern, and this sequence accurately models the time it takes to serve customers in real life. random distribution You Answered normalized distribution probabilistic distribution Correct Answer statistical distribution Question 191 / 1 pts Some physical models have serious moral and ethical consequences. Correct! True False Question 200 / 1 pts It is the ____ of a model who best determines what data should be collected and displayed. consumer You Answered engineer Correct Answer user designer Question 211 / 1 pts The correspondence between primary keys and compound keys is what establishes the relationships among various entities in a database._________________________ True Correct! False Question 220 / 1 pts The SQL command to create a table only requires specification of the various attributes by name and data type. You Answered True Correct Answer False Question 230 / 1 pts In the ____ world, customers have quick, easy, and secure access to purchasing items and paying for services through the World Wide Web. virtual commerce e-transactions You Answered web commerce Correct Answer ecommerce Question 241 / 1 pts Accessing a record in a large file involves at least one disk input/output (I/O) operation(s). Correct! True False Question 251 / 1 pts To be considered a robot, it must be in some way humanoid in design. Correct! False True Question 261 / 1 pts ____ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems. Neural networks Database technology Correct! Artificial intelligence Internet technology Question 271 / 1 pts The term ____ means "method of assertion." QED knowledge engineering Correct! modus ponens forward chaining Question 280 / 1 pts Computational tasks are tasks for which accurate answers need not be found. _________________________ You Answered True Correct Answer False Question 291 / 1 pts Rotation is the lateral (up, down, right, left, in, out) movement of every point in an object by the same amount and in the same direction. _________________________ True Correct! False Question 300 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. You Answered False Correct Answer True Question 310 / 1 pts The branch of computer graphics that studies methods for creating images at a rate matching that of the real world is called ____. You Answered new world graphics real-world graphics just-in-time graphics Correct Answer real-time graphics Question 321 / 1 pts On March 31, 1952, the UNIVAC I was delivered to the ____. General Electric Correct! U.S. Census Bureau Atomic Energy Commission U.S. Army Question 330 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. Correct Answer iAlbums digital store AppleOne Music You Answered iTunes Music Store Apple Music Experience Question 340 / 1 pts In a(n) ____, we move back and forth between different viewpoints, criticizing each and trying to learn from each. You Answered encryption scheme utilitarian scheme PGP Correct Answer dialectic Question 350 / 1 pts ____ answer the question "Good for whom?" with a hearty, "Good for everyone!" Correct Answer Utilitarians Intelligent agents Deontologists You Answered Consequentialists

Question 10 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. You Answered object compiling link Correct Answer assembly Question 20 / 1 pts Machine language is also known as ____ code. link You Answered reloadable Correct Answer object source Question 30 / 1 pts Syntax is the rules for exactly how _______ must be written in a programming language. Correct Answer statements orders You Answered executables instructions Question 40 / 1 pts The ____ evaluates a proposed project and compares the costs and benefits of various solutions. design study specification study Correct Answer feasibility study You Answered work breakdown study Question 51 / 1 pts With a suitable parallel processor, a search for the largest of 1,000,000 numbers requires (2*lgN), or ____ steps. Correct! 40 1 1,000,000 500 Question 61 / 1 pts C++ was designed with engineering applications in mind. _________________________ Correct! False True Question 70 / 1 pts ____ was born out of frustration with existing languages and environments for systems programming. Correct Answer Go C# F# You Answered FORTRAN Question 80 / 1 pts Early versions of FORTRAN did not include a while loop mechanism. _________________________ You Answered False Correct Answer True Question 91 / 1 pts High-level languages must be translated into machine language before they can be executed. _________________________ Correct! True False Question 100 / 1 pts A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its data type. rule You Answered parse tree production Correct Answer semantic record Question 111 / 1 pts A BNF rule is also known as a token. True Correct! False Question 120 / 1 pts ____ begins at the productions in the tree that are nearest to the original input tokens. Parsing You Answered Lexical analysis Correct Answer Code generation Semantic analysis Question 130 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ Correct Answer False You Answered True Question 140 / 1 pts It's possible to compare the efficiency of a Turing machine algorithm with an algorithm that runs on a "real" computer. Correct Answer False You Answered True Question 150 / 1 pts The equation for the distance d that a moving vehicle travels—the product of rate r and time t—is considered to be a model. You Answered False Correct Answer True Question 160 / 1 pts The ____ thesis can never be proved because the definition of an algorithm is descriptive, not mathematical. Alan-Zimmerman You Answered Church-Zimmerman Church-Alan Correct Answer Church-Turing Question 171 / 1 pts We model the behavior of a system only at an explicit and finite set of times. Correct! True False Question 181 / 1 pts The clever use of visual enhancements such as ____ can make an enormous difference in how easy or hard it is to interpret the output of a computer model. color and time size and time Correct! color and scale size and perspective Question 190 / 1 pts Building a good model can be a difficult task that requires us to capture, in translational form, all the important factors that influence the behavior of a system. _________________________ Correct Answer False You Answered True Question 201 / 1 pts Computational models are an excellent way to design new systems and to improve the behavior of existing systems. Correct! True False Question 210 / 1 pts The term __________ expresses that we now have huge amounts of data available. You Answered large data data warehouse data store Correct Answer big data Question 221 / 1 pts You maintain a ____ web presence to streamline transactions between you as the seller and other businesses as buyers. S2B C2B B2S Correct! B2B Question 230 / 1 pts A database management system can relate information between various tables through ____ values. Correct Answer key You Answered prepared special primary Question 241 / 1 pts Authentication is the process of verifying the identity of the receiver of the data._________________________ False Correct! True Question 250 / 1 pts Forward chaining begins with assertions and tries to match those assertions to the "if" clauses of rules, thereby generating new assertions. _________________________ Correct Answer True You Answered False Question 260 / 1 pts A(n) ____ begins to not merely wait for user commands but initiates communication, takes action, and performs tasks on its own on the basis of its increasing knowledge of your needs and preferences. personalized web server You Answered wizard Correct Answer intelligent agent computer personal assistant Question 270 / 1 pts A formal language representation has the disadvantage of extracting the essentials. Correct Answer False You Answered True Question 281 / 1 pts A __________ is presented with training data, for which the correct outputs are known. Turing network Correct! neural network cognitive network machine learning network Question 291 / 1 pts In the technique known as ____, first it is determined which planes can be seen from the user's point of view, based on location and opaqueness, and then only those objects visible in the next frame are rendered, omitting all operations on hidden surfaces. clicking slicing Correct! culling striping Question 300 / 1 pts The world in which the MMOG action takes place is created and managed by special computers called ____. game hosts Correct Answer game servers You Answered game servlets game clients Question 311 / 1 pts Stop-motion special effects were first used in fantasy, adventure, and science-fiction movies of the 1940s. False Correct! True Question 321 / 1 pts Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a sequence, and the elapsed time. central cells (CC) wire-frame Prolog algorithm Correct! first and last frame Question 330 / 1 pts The word ____ is from the Greek and means "the study of duty." Correct Answer deontology You Answered modus ponens encryption hacker Question 341 / 1 pts The scholarly field of ethics has a long history of studying how to identify and resolve conflicts. False Correct! True Question 351 / 1 pts VoIP stands for Voice over Internet Protocol. _________________________ Correct! True False

Question 10 / 1 pts If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn't introduced a new error into code that was previously correct. You Answered False Correct Answer True Question 20 / 1 pts In assembly language, the programmer need not manage the details of the movement of data items within memory. You Answered True Correct Answer False Question 30 / 1 pts ____ is the process of translating the detailed designs into computer code. You Answered Translating Interpreting Correct Answer Coding Configuring Question 41 / 1 pts The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine. Correct! True False Question 51 / 1 pts Old computer code that is still in use is known as ____. Y2K code portable code Correct! legacy code spaghetti code Question 60 / 1 pts ____ was born out of frustration with existing languages and environments for systems programming. F# Correct Answer Go You Answered FORTRAN C# Question 71 / 1 pts Lady Ada Lovelace is regarded as the world's first programmer on the basis of her correspondence with Charles Babbage and her published notes on his work with the Analytic Engine. False Correct! True Question 80 / 1 pts Java is the language used to frame database queries. _________________________ You Answered True Correct Answer False Question 91 / 1 pts ____ is the replacement of slow arithmetic operations with faster ones. Constant evaluation Correct! Strength reduction Eliminating unnecessary operations Parse tree construction Question 101 / 1 pts During the parsing phase, the sequence of tokens formed by the scanner is checked to see whether it is _________ correct according to the rules of the programming language. Correct! syntactically grammatically algorithmically always Question 110 / 1 pts A(n) ____ definition defines a nonterminal symbol in terms of itself. local Correct Answer recursive global You Answered ambiguous Question 121 / 1 pts The singular goal of compilers is correctness. Correct! False True Question 130 / 1 pts It is important to note that unsolvable problems related to the halting problem are unsolvable because of their ____. Correct Answer generality You Answered specificity simplicity complexity Question 140 / 1 pts Each time a Turing machine operation is done, three actions take place. _________________________ Correct Answer True You Answered False Question 150 / 1 pts A formal basis for proofs might allow for ____ theorem-proving. Correct Answer mechanical observable indisputable You Answered unsolvable Question 160 / 1 pts The symbols for a Turing machine must come from a finite set of symbols called the tape ____. palette You Answered placeholder blank Correct Answer alphabet Question 170 / 1 pts The throw of the dice or the drawing of a card, if looked at programmatically, may be considered a __________. deterministic component You Answered stochastic component Correct Answer static component conventional component Question 181 / 1 pts It is certainly a lot easier to work with a numerical description of data than a visualization. Correct! False True Question 191 / 1 pts Computational models can only be graphed and never use three dimensional images. True Correct! False Question 201 / 1 pts If we know the ____, then the computer can generate a sequence of random numbers that follows this pattern, and this sequence accurately models the time it takes to serve customers in real life. normalized distribution random distribution Correct! statistical distribution probabilistic distribution Question 210 / 1 pts An ____ will, for a fee, design your website and manage it on an ongoing basis. application manager You Answered application hosting provider application management provider Correct Answer application service provider Question 220 / 1 pts The Internet has been around since 1969. You Answered False Correct Answer True Question 230 / 1 pts Accessing a record in a large file involves at least one disk input/output (I/O) operation(s). Correct Answer True You Answered False Question 240 / 1 pts In the ____ world, customers have quick, easy, and secure access to purchasing items and paying for services through the World Wide Web. virtual commerce You Answered web commerce Correct Answer ecommerce e-transactions Question 251 / 1 pts To be considered a robot, it must be in some way humanoid in design. True Correct! False Question 260 / 1 pts Cause and effect relationships are translated into "for every" statements. _________________________ Correct Answer False You Answered True Question 270 / 1 pts Any knowledge representation scheme we select must be relatively easy to extend to include new knowledge. You Answered False Correct Answer True Question 280 / 1 pts Proponents of the reactive strategy of robotics argue that a robot cannot react meaningfully without processing the stimulus and planning a reaction based on its internal representation of the environment. _________________________ You Answered True Correct Answer False Question 291 / 1 pts A noncompetitive MMOG is sometimes called a ____. microverse nanoverse Correct! metaverse miniverse Question 300 / 1 pts ____ games allow a large number of players, often thousands or tens of thousands, to interact, form groups, and compete against one another within a simulated virtual world. You Answered MMRPG MMPRG Correct Answer MMOG MMORG Question 310 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. You Answered False Correct Answer True Question 320 / 1 pts The server software that creates the MMOG world is always running and always available, and it always remembers the current state of every player. _________________________ You Answered False Correct Answer True Question 331 / 1 pts An ethical dialectic usually has a clean stopping point. True Correct! False Question 340 / 1 pts Some people view hackers as social gadflies, people who raise important, but irritating, questions about society. Correct Answer True You Answered False Question 351 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. Apple Music Experience Correct! iAlbums digital store AppleOne Music iTunes Music Store

Question 11 / 1 pts In a high-level language, the programmer's only responsibilities for managing data items are to declare (or in the case of Python, create) all constants and variables the program will use. False Correct! True Question 21 / 1 pts ____ includes online tutorials or help systems that the user can bring up while the program is running, and (less often) written user's manuals. First-level documentation Technical documentation Rough documentation Correct! User documentation Question 30 / 1 pts High-level programming languages were created to overcome the deficiencies of _______ language. compiling object You Answered link Correct Answer assembly Question 41 / 1 pts ____ takes place on each module (subtask code) as it is completed. System testing Regression testing Integration testing Correct! Unit testing Question 51 / 1 pts With a suitable parallel processor, a search for the largest of 1,000,000 numbers requires (2*lgN), or ____ steps. 500 1,000,000 1 Correct! 40 Question 61 / 1 pts READ is the __________ implementation of "input." Correct! Fortran C# C++ Cobol Question 71 / 1 pts Compared to functional programming, ____ goes a step further toward not specifying exactly how a task is to be done. logic outlining logic interfacing Correct! logic programming logic structuring Question 81 / 1 pts Today ____ is still strong in the transportation industry (aircraft, helicopters, subway systems, European high-speed train control systems) and in safety monitoring systems at nuclear reactors as well as in financial and communication systems. Java C Correct! Ada C++ Question 91 / 1 pts The right-hand side of a BNF rule is the name of a single grammatical category. True Correct! False Question 101 / 1 pts In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language. OOP code optimization Correct! parsing BNF Question 111 / 1 pts A ____ shows how individual tokens can be grouped into predefined grammatical categories until the desired goal is reached. scanner Correct! parse tree compiler parser Question 121 / 1 pts Parsing is the first phase of the compilation process. _________________________ True Correct! False Question 130 / 1 pts The bit inverter Turing machine should have two states. _________________________ You Answered True Correct Answer False Question 141 / 1 pts In a _______ diagram, circles are used to represent states. Correct! state unary binary tape Question 150 / 1 pts If a Turing machine program consists of the following four instructions: (1,0,1,2,R) (1,1,0,2,R) (2,0,0,2,R) (2,b,b,2,L) then the configuration ____ is a halting configuration. ... b 1 0 b b b ... (current state = 1, symbol 0 is being read) ... b 1 0 b b b ... (current state = 2, symbol 0 is being read) You Answered ... b 1 1 b b b ... (current state = 1, symbol 1 is being read) Correct Answer ... b 1 1 b b b ... (current state = 2, symbol 1 is being read) Question 160 / 1 pts The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine to do that task. Alan-Zimmerman thesis You Answered Church-Alan theorem Church-Zimmerman thesis Correct Answer Church-Turing thesis Question 170 / 1 pts Computational steering is usually feasible using physical models. _________________________ You Answered True Correct Answer False Question 180 / 1 pts A ____ is a representation of the system being studied, which we claim behaves much like the original. Correct Answer model problem You Answered replica concept Question 190 / 1 pts When we process an event, we change the ____ of the simulated system in the same way that the actual system would change if this event had occurred in real life. condition Correct Answer state You Answered parameter event Question 201 / 1 pts It is certainly a lot easier to work with a numerical description of data than a visualization. Correct! False True Question 210 / 1 pts A ____ gives the user, or the user's application software, the ability to combine and manipulate data easily in ways that would be very difficult if the data were kept in separate and unrelated files. datastore file You Answered data system Correct Answer database Question 220 / 1 pts The number-one attraction to online shopping is probably ____. You Answered lower cost speed the ability to view products Correct Answer convenience Question 230 / 1 pts Each record in a file contains information about an item in the "universe of discourse" that the file describes. Correct Answer True You Answered False Question 240 / 1 pts __________ is the basis of Bitcoin cybercurrency. Chain looping You Answered Blockloop Correct Answer Blockchain Encrypted chain Question 251 / 1 pts To be considered a robot, it must be in some way humanoid in design. Correct! False True Question 260 / 1 pts If an output neuron fires when it is not supposed to, then the positive input values coming into it are adjusted upward. _________________________ You Answered True Correct Answer False Question 271 / 1 pts Forward chaining begins with assertions and tries to match those assertions to the "if" clauses of rules, thereby generating new assertions. _________________________ Correct! True False Question 280 / 1 pts Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences. You Answered back propagation brute force Correct Answer heuristic swarm intelligence Question 291 / 1 pts A movie is an interactive environment. True Correct! False Question 301 / 1 pts King Kong's movements in the 1933 film were created using a manual technique called ____. film overlay Correct! stop-motion animation CGI skip-motion animation Question 311 / 1 pts In stop-motion animation, a single photograph is called a ____. cell block unit Correct! frame Question 321 / 1 pts A GPU executes instructions in parallel with the ________, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display. PGU GIPU NPU Correct! CPU Question 331 / 1 pts ____ answer the question "Good for whom?" with a hearty, "Good for everyone!" Correct! Utilitarians Consequentialists Intelligent agents Deontologists Question 341 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. AppleOne Music iTunes Music Store Correct! iAlbums digital store Apple Music Experience Question 350 / 1 pts Some people view hackers as social gadflies, people who raise important, but irritating, questions about society. You Answered False Correct Answer True

Question 10 / 1 pts In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. programs You Answered subtasks tasks Correct Answer memory locations Question 20 / 1 pts ____ takes place on each module (subtask code) as it is completed. Regression testing Correct Answer Unit testing You Answered System testing Integration testing Question 31 / 1 pts Most programming languages are now presented within an ____. Correct! integrated development environment interactive development environment integrated deployment environment implementation development environment Question 41 / 1 pts If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn't introduced a new error into code that was previously correct. Correct! True False Question 50 / 1 pts Early versions of FORTRAN allowed the use of mathematical symbols such as < to compare two quantities. You Answered True Correct Answer False Question 61 / 1 pts The use of parallelism always reduces processing time because subtasks are being executed concurrently. Correct! False True Question 71 / 1 pts Much of the processing in the business world concerns updating "transaction files" with changes from "master files." Correct! False True Question 81 / 1 pts Old computer code that is still in use is known as ____. portable code Correct! legacy code Y2K code spaghetti code Question 90 / 1 pts A grammar that allows the construction of two or more distinct parse trees for the same statement is called a recursive grammar. You Answered True Correct Answer False Question 100 / 1 pts In BNF, the syntax of a language is specified as a series of rules. _________________________ Correct Answer True You Answered False Question 110 / 1 pts The collection of all statements that can be successfully parsed is called the ____ defined by a grammar. Correct Answer language You Answered terminal nonterminal rule Question 121 / 1 pts The English-language sentence, "The orange artichoke flew through the pink eight-legged elephant" is semantically meaningful. _________________________ Correct! False True Question 131 / 1 pts Prototypes are an important way of studying many physical and social phenomena. _________________________ True Correct! False Question 141 / 1 pts The Turing machine must execute instructions in the order that the instructions are numbered. True Correct! False Question 150 / 1 pts If a Turing machine program consists of the following four instructions: (1,0,1,2,R) (1,1,0,2,R) (2,0,0,2,R) (2,b,b,2,L) then the configuration ____ is a halting configuration. You Answered ... b 1 0 b b b ... (current state = 2, symbol 0 is being read) Correct Answer ... b 1 1 b b b ... (current state = 2, symbol 1 is being read) ... b 1 1 b b b ... (current state = 1, symbol 1 is being read) ... b 1 0 b b b ... (current state = 1, symbol 0 is being read) Question 160 / 1 pts A Turing machine includes a(n) infinite platter that can be stamped with only one symbol per sector. _________________________ You Answered True Correct Answer False Question 170 / 1 pts Scientists often work with a model of a system rather than experimenting on the "real thing." You Answered False Correct Answer True Question 181 / 1 pts We always know, in a mathematical sense, exactly how to describe certain types of systems and behaviors. True Correct! False Question 190 / 1 pts Computational models can only be graphed and never use three dimensional images. Correct Answer False You Answered True Question 201 / 1 pts The use of ____ becomes even more important as the amount of output increases and grows more complex. renderings Correct! visualizations data models Question 210 / 1 pts The Census Bureau of the U.S. Department of Commerce estimated ecommerce retail sales in the United States for the first quarter of 2017 to be $105.7 billion, an increase of 14% from the first quarter of 2016. Correct Answer True You Answered False Question 221 / 1 pts Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones. False Correct! True Question 231 / 1 pts The correspondence between primary keys and compound keys is what establishes the relationships among various entities in a database._________________________ Correct! False True Question 241 / 1 pts A database management system can relate information between various tables through ____ values. prepared primary Correct! key special Question 250 / 1 pts A(n) ____ begins to not merely wait for user commands but initiates communication, takes action, and performs tasks on its own on the basis of its increasing knowledge of your needs and preferences. Correct Answer intelligent agent You Answered wizard computer personal assistant personalized web server UnansweredQuestion 260 / 1 pts Building a machine that can beat a human at chess was viewed as the last of the "easy" hard problems. False Correct Answer True UnansweredQuestion 270 / 1 pts Cause and effect relationships are translated into "for every" statements. _________________________ True Correct Answer False UnansweredQuestion 280 / 1 pts In some areas of the brain, an individual neuron may collect signals from as many as 100,000 other neurons and send signals to equally large number of other neurons. False Correct Answer True UnansweredQuestion 290 / 1 pts With a GPU, all imaging responsibilities are offloaded from the GPU to the CPU. Correct Answer False True UnansweredQuestion 300 / 1 pts Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a sequence, and the elapsed time. Correct Answer first and last frame wire-frame Prolog algorithm central cells (CC) UnansweredQuestion 310 / 1 pts ____ are fully modeled and fully rendered objects stored in a video library in video memory. Correct Answer Cut-ins Cut-outs Block-ins Block-outs UnansweredQuestion 320 / 1 pts By the mid-1990s, computer hardware could handle the computational demands required to create realistic three-dimensional images. False Correct Answer True UnansweredQuestion 330 / 1 pts Apple introduced the ______________ in 2003 as a service to its iPod music player. AppleOne Music Apple Music Experience Correct Answer iAlbums digital store iTunes Music Store UnansweredQuestion 340 / 1 pts "Sharing" of music and movies was rare prior to the popularity of high-speed Internet. Correct Answer False True UnansweredQuestion 350 / 1 pts ____ arguments focus on the duties of the person acting and the way the act impinges on the rights of others. Consequentialist Utilitarian Hacker Correct Answer Deontological

logic programming

Compared to functional programming, ____ goes a step further toward not specifying exactly how a task is to be done.

False

C programs cannot make use of low-level information such as knowledge of where data are stored in memory. _________________________

False

Culls are fully modeled and fully rendered objects stored in a video library in video memory. _________________________

True

Each language learned about the uses of its own notation (--, //, or #) to denote a program comment.

True

FORTRAN does allow the use of external libraries.

True

Forward chaining begins with assertions and tries to match those assertions to the "if" clauses of rules, thereby generating new assertions. _________________________

True

Using computers for entertainment had by the early 1980s become an important, not to mention financially lucrative, industry and that growth has continued unabated.

Distributed databases

____ allow the physical data to reside at separate and independent locations that are electronically networked together.

C

____ is the most widely used language for writing system software because it combines the power of a high-level language with the ability to circumvent that level of abstraction and work at the assembly-language-like level.

Coding

____ is the process of translating the detailed designs into computer code.

Parallel processing

____, which includes MIMD, is really a catchall term for a variety of approaches to computing architectures and algorithm design.


Set pelajaran terkait

Chapter 57 practice questions- PrepU Drugs Affecting GI Secretions

View Set

Chapter 70: Management of Patients With Neurologic Trauma NCLEX

View Set

Chapter 7: 2 Body Planes, Directions, and Cavities

View Set

Macroeconomics Chapter 16 (Final Exam) HSU

View Set

NUR 303 - Chapter 44: Assessment of Digestive and Gastrointestinal Function

View Set

US History A: Unit 4 - Complete Review

View Set