Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

computer science 150 Chapter 1 quiz 2023 with complete solution questions and answers

Beoordeling
-
Verkocht
-
Pagina's
12
Cijfer
A+
Geüpload op
22-04-2023
Geschreven in
2022/2023

All information that is to be processed by a computer must first be entered into memory via an input device. true A list of instructions provided to the computer is called a program. True Statements in a highlevel language are converted to statements in machine language by a loader. false Some files contain data for a program; others contain the program statements themselves. true A syntax error in a program is an error that causes the program to produce incorrect output. false One task of an operating system is to provide input and output facilities to a program. true When a program begins to execute, the contents of the memory cells it uses are initially empty. false If the computer is switched off, data in secondary storage is usually not lost. true Loading the operating system from disk into memory is called booting the computer. true Machine language is the same for all CPUs. False A program's instructions must be store in main memory before they can be executed. true Part of the operating system is typically store in ROM for faster booting. True Main memory is typically capable of storing more information than a secondary storage device. false User account codes are private property. true Information stored in secondary storage is organized into aggregates called __________. 1) hardware 2) files 3) bytes 4) memory cells 5) none of the above 2) files The part of the computer responsible for retrieving data and instructions from memory for processing is the __________. 1) hardware 2) loader 3) central processing unit 4) linker 5) instructiondatafetch unit central processing unit The proper sequence of steps needed to correct invalid statements and reexecute a program is: 1) Enter the editor, make corrections, link the program, reload the program, and save the program. 2) Enter the editor, compile, load the program, correct statements, link the program, and save the program. 3) Enter the editor, insert corrected statements, load, compile, and execute the program. 4) Enter the editor, correct invalid statements, save the program, compile, link, load, and execute the program. 5) none of the above 4) enter the editor, correct invalid statements, save the program, compile, link, load and execute the program The first electronic digital computer was designed in the late 1930s by __________. 1) John Atanasoff and Clifford Berry 2) John von Neumann 3) Steve Jobs and John Eckert 4) Albert Einstein 5) Niklaus Wirth 1) John Atanasoff and Clifford Berry The Internet is an example of a __________. 1) LAN 2) WAN 3) CPU 4) file server 5) modem 2) WAN An integrated circuit containing the full circuitry of a CPU is called a _________. 1) mainframe 2) processor chip 3) memory chip 4) supercomputer 5) RAM 2) processor chip The component of a digital computer that can compare data stored in its registers is the __________. 1) arithmetic logic unit (or CPU) 2) logical comparison unit 3) cable Internet access 4) register bank 5) central logic unit 1) arithmetic logic unit (or CPU) Which of the following is not an advantage of a highlevel language? 1) It is easier to use than machine language. 2) Its statements resemble English. 3) It is portable. 4) Memory can be referenced symbolically. 5) It is easy for the machine to understand. 5) It is easy for the machine to understand The object file is created by the __________. 1) editor 2) linker 3) loader 4) central processing unit 5) compiler 5) compiler An application that provides the user with pictures and menus from which to select commands and data is said to have a(n) __________. 1) GUI 2) command-line interface 3) IDE 4) CPU 5) compiler 1) GUI The ability to store programs as well as data is called the __________. 1) top-down design process 2) stored program concept 3) software development method 4) boot process 5) algorithm design 2) stored program concept Modelling a problem by extracting the essential variables and their relationships is called a(n) __________. 1) algorithm 2) interface 3) abstraction 4) top-level design 5) top-down design 3) abstraction Which programming language is typically used for Android development? 1) C 2) Java 3) Python 4) C# 5) Perl 2) Java Which programming language is used by Apple for iPhone application software? 1) Perl 2) C# 3) Java 4) JavaScript 5) Objective C 5) Objective C Which programming language adds object-oriented features to C? 1) Objective C 2) PHP 3) C# 4) C++ 5) Java 4) C++ Performing each step of an algorithm by hand the same as a computer would to verify the algorithm is correct is called a(n) __________. 1) step-wise refinement 2) desk check 3) top-down design 4) program maintenance 5) software development 2) desk check The __________ verifies a user's right to access a computer and data. 1) operating system 2) compiler 3) interpreter 4) CPU 5) editor 1) operating system Keeping a program up-to-date and correcting previously undetected errors is part of __________. 1) testing 2) step-wise refinement 3) software development 4) maintenance 5) compiling 4) maintenance Copyright laws are used to help protect a company from __________. 1) computer fraud 2) software piracy 3) worms 4) viruses 5) plagiarism 2) software piracy Modifying someone else's code and claiming that it is your own is called __________. 1) plagiarism 2) hacking 3) computer abuse 4) computer fraud 5) none of the above 1) plagiarism A(n) _________ is the amount of memory required to store a single character. byte A(n) _________ is the amount of memory required to store a single binary digit. bit __________________________ is a high-speed Internet connection that uses the same coaxial cable that carries cable TV. Cable Internet Access Temporary storage for programs and data is called ________ Machine language Data that is taken from the keyboard during program execution is called ___________ data. input A(n) _________ converts computer data into audio tones that can be transmitted over a normal telephone circuit. modem The part of the computer that allocates memory and processor time is the __________________. operating system A payroll report is an example of program ______________. output In a laboratory, several computers may be linked together on a local area ______________ network ______________stores instructions burned at the factory and is non-volatile. Read-only memory Programs that help a user accomplish specific tasks are called ____________ application Special high-speed memory locations that are in the CPU are called _____________ register In a command-line interace, the ____________indicates the computer is ready for input. prompt A speaker is an example of a(n) ___________ device. output A microphone is an example of a(n) _________ device. input Code that is attached to another program that spread's through the computer's memory creating harm is called a(n) _______ virus A(n) ___________ disrupts a computer network by replicating itself on other network computers. worm

Meer zien Lees minder
Instelling
Computer Science 150 Chapter
Vak
Computer science 150 Chapter









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Computer science 150 Chapter
Vak
Computer science 150 Chapter

Documentinformatie

Geüpload op
22 april 2023
Aantal pagina's
12
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Arthurmark Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
45
Lid sinds
4 jaar
Aantal volgers
39
Documenten
1422
Laatst verkocht
6 maanden geleden

3.7

9 beoordelingen

5
5
4
0
3
2
2
0
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen