computer science 150 Chapter 1 quiz
An application that provides the user with pictures and menus from which to select commands and data is said to have a(n) __________. 1) GUI 2) command-line interface 3) IDE 4) CPU 5) compiler
1) GUI
The first electronic digital computer was designed in the late 1930s by __________. 1) John Atanasoff and Clifford Berry 2) John von Neumann 3) Steve Jobs and John Eckert 4) Albert Einstein 5) Niklaus Wirth
1) John Atanasoff and Clifford Berry
The component of a digital computer that can compare data stored in its registers is the __________. 1) arithmetic logic unit (or CPU) 2) logical comparison unit 3) cable Internet access 4) register bank 5) central logic unit
1) arithmetic logic unit (or CPU)
The __________ verifies a user's right to access a computer and data. 1) operating system 2) compiler 3) interpreter 4) CPU 5) editor
1) operating system
Modifying someone else's code and claiming that it is your own is called __________. 1) plagiarism 2) hacking 3) computer abuse 4) computer fraud 5) none of the above
1) plagiarism
Which programming language is typically used for Android development? 1) C 2) Java 3) Python 4) C# 5) Perl
2) Java
The Internet is an example of a __________. 1) LAN 2) WAN 3) CPU 4) file server 5) modem
2) WAN
Performing each step of an algorithm by hand the same as a computer would to verify the algorithm is correct is called a(n) __________. 1) step-wise refinement 2) desk check 3) top-down design 4) program maintenance 5) software development
2) desk check
Information stored in secondary storage is organized into aggregates called __________. 1) hardware 2) files 3) bytes 4) memory cells 5) none of the above
2) files
An integrated circuit containing the full circuitry of a CPU is called a _________. 1) mainframe 2) processor chip 3) memory chip 4) supercomputer 5) RAM
2) processor chip
Copyright laws are used to help protect a company from __________. 1) computer fraud 2) software piracy 3) worms 4) viruses 5) plagiarism
2) software piracy
The ability to store programs as well as data is called the __________. 1) top-down design process 2) stored program concept 3) software development method 4) boot process 5) algorithm design
2) stored program concept
Modelling a problem by extracting the essential variables and their relationships is called a(n) __________. 1) algorithm 2) interface 3) abstraction 4) top-level design 5) top-down design
3) abstraction
Which programming language adds object-oriented features to C? 1) Objective C 2) PHP 3) C# 4) C++ 5) Java
4) C++
The proper sequence of steps needed to correct invalid statements and reexecute a program is: 1) Enter the editor, make corrections, link the program, reload the program, and save the program. 2) Enter the editor, compile, load the program, correct statements, link the program, and save the program. 3) Enter the editor, insert corrected statements, load, compile, and execute the program. 4) Enter the editor, correct invalid statements, save the program, compile, link, load, and execute the program. 5) none of the above
4) enter the editor, correct invalid statements, save the program, compile, link, load and execute the program
Keeping a program up-to-date and correcting previously undetected errors is part of __________. 1) testing 2) step-wise refinement 3) software development 4) maintenance 5) compiling
4) maintenance
Which of the following is not an advantage of a highlevel language? 1) It is easier to use than machine language. 2) Its statements resemble English. 3) It is portable. 4) Memory can be referenced symbolically. 5) It is easy for the machine to understand.
5) It is easy for the machine to understand
Which programming language is used by Apple for iPhone application software? 1) Perl 2) C# 3) Java 4) JavaScript 5) Objective C
5) Objective C
The object file is created by the __________. 1) editor 2) linker 3) loader 4) central processing unit 5) compiler
5) compiler
__________________________ is a high-speed Internet connection that uses the same coaxial cable that carries cable TV.
Cable Internet Access
Machine language is the same for all CPUs.
False
Temporary storage for programs and data is called ________
Machine language
______________stores instructions burned at the factory and is non-volatile.
Read-only memory
A list of instructions provided to the computer is called a program.
True
Part of the operating system is typically store in ROM for faster booting.
True
Programs that help a user accomplish specific tasks are called ____________
application
A(n) _________ is the amount of memory required to store a single binary digit.
bit
A(n) _________ is the amount of memory required to store a single character.
byte
The part of the computer responsible for retrieving data and instructions from memory for processing is the __________. 1) hardware 2) loader 3) central processing unit 4) linker 5) instructiondatafetch unit
central processing unit
A syntax error in a program is an error that causes the program to produce incorrect output.
false
Main memory is typically capable of storing more information than a secondary storage device.
false
Statements in a highlevel language are converted to statements in machine language by a loader.
false
When a program begins to execute, the contents of the memory cells it uses are initially empty.
false
A microphone is an example of a(n) _________ device.
input
Data that is taken from the keyboard during program execution is called ___________ data.
input
A(n) _________ converts computer data into audio tones that can be transmitted over a normal telephone circuit.
modem
In a laboratory, several computers may be linked together on a local area ______________
network
The part of the computer that allocates memory and processor time is the __________________.
operating system
A payroll report is an example of program ______________.
output
A speaker is an example of a(n) ___________ device.
output
In a command-line interace, the ____________indicates the computer is ready for input.
prompt
Special high-speed memory locations that are in the CPU are called _____________
register
A program's instructions must be store in main memory before they can be executed.
true
All information that is to be processed by a computer must first be entered into memory via an input device.
true
If the computer is switched off, data in secondary storage is usually not lost.
true
Loading the operating system from disk into memory is called booting the computer.
true
One task of an operating system is to provide input and output facilities to a program.
true
Some files contain data for a program; others contain the program statements themselves.
true
User account codes are private property.
true
Code that is attached to another program that spread's through the computer's memory creating harm is called a(n) _______
virus
A(n) ___________ disrupts a computer network by replicating itself on other network computers.
worm