Computer Science Final quiz questions
Select all that apply: which of the following can be considered typical processing instructions
1)compute the logical AND of two values 2)test if a bit is 0 and jump to a specific set of instructions based on the outcome 3)shift the bits of a word to the right, putting 0s on the left and discarding the bits on the right
assume you use the product operation on table A(5 attributes)X table B(3 attributes) the resulting supertable will have
8 attributes
Logic gates, part of a circuit in the ALU, are used to implement operations like AND and OR
True
generally speaking, a software license gives you
use of the software
Algorithms are used by
various agents
The speed of a computer is dependent on the number of cycles of what?
All of these(input system, operating system, fetch/execute cycle)
A form of program that is directly executional by a computer is called a(n)
Binary object file
In the united states the protection of an individuals privacy is the responsibility of the U.S government
FALSE
emptying the trash on your computer guarantees that the data has been erased
FALSE
it is better to write one email message that covers multiple topics than to write several messages, each covering one topic
FALSE
If you have a printer attached to your computer and then add a new pair of speakers, you will not need a device driver since you already have a device driver for the printer
False
The processors electronic clock is what shows you the current time on your computers desktop
False
To be effective, an algorithm relies on outside help to provide further input
False
A computers software stack
Features layers of software of increasing generality and sophistication
Select all that apply: which properties of a valid algorithm are violated by the instruction seen so often on shampoo hair bottles "lather, rinse, repeat"
Finiteness
The peripheral used for both the input and output is the
Hard disk
select all that apply. personal information can be tracked by
IP addresses, cell phone use, and cookies
In the fetch/execute cycle, the action of determining which operation is to be performed and computing the addresses of the operands occurs during the
Instruction Decode (ID) step
Instruction sequences that repeat are called:
Loops
Select all that apply: which of the following can complete the statement below? Different algorithms for the same problem can
Solve the problem differently
cookies can be used to track your online travels by using ad placement on various web sites
TRUE
A loop in an algorithm must also include a test which can end the repitition
True
Algorithms use functions(operations that the agent already knows how to perform) to simplify the algorithmic description
True
An algorithm is a systematic method to produce a specified result
True
Anyone who creates an algorithm needs to know why it works.
True
Every memory location in the computer is numbered, starting at 0.
True
It is possible for the output of an algorithm to be a statement that says there is no possible solution
True
Running a program with the exact same data produces the exact same results every time
True
The sequence of commands is important in an algorithm.
True
The type of data, the amount of data, and the form of the data that the algorithm expects. must be specified when creating an algorithm
True
rules for writing XML include
a required first line that identifies an XML file, tags and attributes are not case sensitive, and element names must begin with a special symbol
select all that apply: the encoding rules of XML include which of the following?
affinity rule:enclose all data that refer to the same thing in a pair of tags, identification rule: label data with tags consistently, and collection rule: group related instances
most login protocols
allow several but not unlimited attempts
if a cell points to cell $M3 this is an example of a(n)
an absolute reference to the column and a relative reference to the row
if a cell points to cell N$8 this is an example of
an absolute reference to the row and a relative reference to the column
An example of conditional formatting is:
applying a font color, e.g., green, to values over 500
backups on a personal computer
are just as essential to a personal system as a business system
companies that make products available as open source software
are promoting wide distribution of the software
An attribute or set of attributes that could potentially be chosen as the table's key is a:
candidate key
the basic unit of a spreadsheet is a
cell
select all that apply:personal information can be tracked by:
cell phone use, cookies, IP addresses
when choosing a password, a good way to help you remember it is to
choose something you are interested in and modify a phrase about that topic to obscure it
select all that apply. Which of the following activities creates an unnecessary risk of being blocked
clicking on a bank's URL instead of typing it in, sending information to a website that does not use an encryption, and responding through emails to specific requests for personal information
to select a range of cells
drag the cursor across the cells
most email is
easy to forward
which of the following is NOT difficult to convey in an email message?
emphasis
American privacy laws are much stricter than European privacy laws
false
The word netiquette refers exclusively to email etiquette
false
To successfully use a database, a user must be able to write SQL.
false
With stringent laws against spam in many places spam is no longer a common problem.
false
With stringent laws against spam in many places, and spammers being prosecuted, spam is no longer a common problem.
false
You cannot mix absolute and relative references in the same cell reference.
false
a program that determines is an email is spam is always accurate
false
a text file is the same thing as a tab-delimited file
false
a third party cookie is initiated by a direct request from the user
false
an XML file is an alternative notation for a database schema
false
hidden columns cannot be referenced in a formula
false
it is better to write one email message that covers multiple topics than to write several messages each covering one topic
false
it is legal to give commercial software to your friends but not to sell it
false
messages that are encrypted using public key RSA129 cryptosystem have, to date, not yet been cracked
false
the difference between a worm and a virus is that the worm program rides along with other software while the virus actually sends itself to other devices on the internet
false
the manner in which time is displayed in a spreadsheet is always in military format
false
web pages cannot be copyrighted
false
the origin of the word "spam"(used to describe junk email) is believed to be
from a Monty Python skit
which of the following is used to compute common summary applications in a spreadsheet
functions
before forwarding emails you should
get the sender's permission
a web page is transmitted securely when the protocol part of the URL is
https
information that you did not create but can treat as your own is said to be
in the public domain
the accuracy of personal information is the responsibility of the
individual
the most important advantage of public key encryption over private key is that
it does not matter if the bad guys find out the key used to encrypt messages
The processor clock
makes the machine cycle go on to the next step
unites states companies that operate in the EU
must handle EU customer data under rules negotiated between the US and EU
The program counter keeps track of the
next instruction to be executed
Suppose cell B4 has an entry. If the data in cell A4 is too wide to fit in the cell, it:
only part of the data will be visible but the rest of the data still exists
the design of a(n)_________ database is guided by technical considerations while the design of a(n)_________database is guided by the personal considerations of the user
physical, logical
the select operation on tables is often combined with the _______ operation to trim tables
project
identity theft is the crime of posing as someone else for fraudulent
purposes
logical tables are created from a
query
when you are working in a software program and it starts acting strange, you should
save your work with a new file name, exit and restart
the unites states approach of passing separate laws to govern privacy in specific industries or activities is called the _______approach
sectoral
select all that apply, which of the following may result from malware
secure information may be obtained from your computer, contents on your hard drive may be erased, and spam may be sent from your computer
what operations takes rows from one table to create a new table
select
a spreadsheet feature that allows the user to enter a series of numbers or dates into a range of cells is called a(n)
series fill
before sending or posting emotional content by email or online
sleep on it
select all that apply: which of the following are options that may be chosen in a two-factor authentication plan
something the user possesses(like a key), something the user is(like a fingerprint), and something the user knows(like a password)
XML tags cannot contain
spaces
the database schema or scheme
succinctly describes a database table, contains a list of attributes one per row, and specifies, for each attribute, its data type and whether or not it is the primary key
XML must be written using a
text editor
if the first character in a cell is an = sign
the cell contains a formula
select all that apply: which of the following statement is(are) TRUE about database tables
the columns of the database table contain attribute names, the database contains a set of things with common attributes, the rows of the database are entities
which of the following statements is NOT true
the rows of a database table do not have to be different, there can be two identical rows
what is the most common use for a spreadsheet
to process numerical data
A formula in a cell always starts with an equal sign.
true
Functions and column letters in a spreadsheet are not case sensitive.
true
If your software is "acting" strange or your computer is "behaving" unusually, these could be indicators of a software problem such as disk fragmentation.
true
If your software is "acting" strange or your computer is "behaving" unusually, you may have a computer virus infection.
true
XML is intuitive because it is a self-describing language
true
a database table is technically called a relation
true
a database table may not contain multiple identical rows, each row must be unique
true
a group of cells is called a range
true
a root element is the tag that encloses all of the content of an XML file
true
because there are two dimensions in a spreadsheet(columns and rows) there are actually two ways a formula can be relative
true
by default, a formula in a spreadsheet will automatically recalculate if any value contained in any of the formula's cell references changes
true
functions and column letters in a spreadsheet are not case sensitive
true
inconsistency is the main reason to avoid redundancy of information in a database
true
information placed in the public domain is free for anyone to use in any form
true
it is possible to figure out who is online with the help of internet service providers and companies like Microsoft
true
relationships connect rows of onwe table with rows of another table
true
the logical database shows the user the view of the information he or she needs and wants
true
the use of shareware implies an obligation to pay for it
true
two factor authentication allows for greater security in user access to web sites
true
viruses are often distributed through email attachments
true
when a new password is created for your computer system it is encrypted and then stored in that form
true
when you reply to an email, it is best to include the context of the message you are replying to
true
when the send button is clicked to send an email
two copies of the message are produced