computer science 150 Chapter 1 quiz 2023 with complete solution questions and answers
All information that is to be processed by a computer must first be entered into memory via an input device. true A list of instructions provided to the computer is called a program. True Statements in a highlevel language are converted to statements in machine language by a loader. false Some files contain data for a program; others contain the program statements themselves. true A syntax error in a program is an error that causes the program to produce incorrect output. false One task of an operating system is to provide input and output facilities to a program. true When a program begins to execute, the contents of the memory cells it uses are initially empty. false If the computer is switched off, data in secondary storage is usually not lost. true Loading the operating system from disk into memory is called booting the computer. true Machine language is the same for all CPUs. False A program's instructions must be store in main memory before they can be executed. true Part of the operating system is typically store in ROM for faster booting. True Main memory is typically capable of storing more information than a secondary storage device. false User account codes are private property. true Information stored in secondary storage is organized into aggregates called __________. 1) hardware 2) files 3) bytes 4) memory cells 5) none of the above 2) files The part of the computer responsible for retrieving data and instructions from memory for processing is the __________. 1) hardware 2) loader 3) central processing unit 4) linker 5) instructiondatafetch unit central processing unit The proper sequence of steps needed to correct invalid statements and reexecute a program is: 1) Enter the editor, make corrections, link the program, reload the program, and save the program. 2) Enter the editor, compile, load the program, correct statements, link the program, and save the program. 3) Enter the editor, insert corrected statements, load, compile, and execute the program. 4) Enter the editor, correct invalid statements, save the program, compile, link, load, and execute the program. 5) none of the above 4) enter the editor, correct invalid statements, save the program, compile, link, load and execute the program The first electronic digital computer was designed in the late 1930s by __________. 1) John Atanasoff and Clifford Berry 2) John von Neumann 3) Steve Jobs and John Eckert 4) Albert Einstein 5) Niklaus Wirth 1) John Atanasoff and Clifford Berry The Internet is an example of a __________. 1) LAN 2) WAN 3) CPU 4) file server 5) modem 2) WAN An integrated circuit containing the full circuitry of a CPU is called a _________. 1) mainframe 2) processor chip 3) memory chip 4) supercomputer 5) RAM 2) processor chip The component of a digital computer that can compare data stored in its registers is the __________. 1) arithmetic logic unit (or CPU) 2) logical comparison unit 3) cable Internet access 4) register bank 5) central logic unit 1) arithmetic logic unit (or CPU) Which of the following is not an advantage of a highlevel language? 1) It is easier to use than machine language. 2) Its statements resemble English. 3) It is portable. 4) Memory can be referenced symbolically. 5) It is easy for the machine to understand. 5) It is easy for the machine to understand The object file is created by the __________. 1) editor 2) linker 3) loader 4) central processing unit 5) compiler 5) compiler An application that provides the user with pictures and menus from which to select commands and data is said to have a(n) __________. 1) GUI 2) command-line interface 3) IDE 4) CPU 5) compiler 1) GUI The ability to store programs as well as data is called the __________. 1) top-down design process 2) stored program concept 3) software development method 4) boot process 5) algorithm design 2) stored program concept Modelling a problem by extracting the essential variables and their relationships is called a(n) __________. 1) algorithm 2) interface 3) abstraction 4) top-level design 5) top-down design 3) abstraction Which programming language is typically used for Android development? 1) C 2) Java 3) Python 4) C# 5) Perl 2) Java Which programming language is used by Apple for iPhone application software? 1) Perl 2) C# 3) Java 4) JavaScript 5) Objective C 5) Objective C Which programming language adds object-oriented features to C? 1) Objective C 2) PHP 3) C# 4) C++ 5) Java 4) C++ Performing each step of an algorithm by hand the same as a computer would to verify the algorithm is correct is called a(n) __________. 1) step-wise refinement 2) desk check 3) top-down design 4) program maintenance 5) software development 2) desk check The __________ verifies a user's right to access a computer and data. 1) operating system 2) compiler 3) interpreter 4) CPU 5) editor 1) operating system Keeping a program up-to-date and correcting previously undetected errors is part of __________. 1) testing 2) step-wise refinement 3) software development 4) maintenance 5) compiling 4) maintenance Copyright laws are used to help protect a company from __________. 1) computer fraud 2) software piracy 3) worms 4) viruses 5) plagiarism 2) software piracy Modifying someone else's code and claiming that it is your own is called __________. 1) plagiarism 2) hacking 3) computer abuse 4) computer fraud 5) none of the above 1) plagiarism A(n) _________ is the amount of memory required to store a single character. byte A(n) _________ is the amount of memory required to store a single binary digit. bit __________________________ is a high-speed Internet connection that uses the same coaxial cable that carries cable TV. Cable Internet Access Temporary storage for programs and data is called ________ Machine language Data that is taken from the keyboard during program execution is called ___________ data. input A(n) _________ converts computer data into audio tones that can be transmitted over a normal telephone circuit. modem The part of the computer that allocates memory and processor time is the __________________. operating system A payroll report is an example of program ______________. output In a laboratory, several computers may be linked together on a local area ______________ network ______________stores instructions burned at the factory and is non-volatile. Read-only memory Programs that help a user accomplish specific tasks are called ____________ application Special high-speed memory locations that are in the CPU are called _____________ register In a command-line interace, the ____________indicates the computer is ready for input. prompt A speaker is an example of a(n) ___________ device. output A microphone is an example of a(n) _________ device. input Code that is attached to another program that spread's through the computer's memory creating harm is called a(n) _______ virus A(n) ___________ disrupts a computer network by replicating itself on other network computers. worm
Geschreven voor
- Instelling
- Computer science 150 Chapter
- Vak
- Computer science 150 Chapter
Documentinformatie
- Geüpload op
- 22 april 2023
- Aantal pagina's
- 12
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
computer science 150 chapter 1 quiz 2023 with complete solution questions and answers
-
all information that is to be processed by a computer must first be entered into memory via an input device true