
Course Introduction
![]()

Course Introduction
Computing Concepts introduces students to the foundational principles and practices of computing, providing an overview of key topics such as algorithms, data structures, computer hardware and software, operating systems, networking, and the basics of programming languages. The course emphasizes understanding how computers solve problems, the role of logic and abstraction in computing, and the impact of computational thinking on various fields. Students will develop analytical skills and gain hands-on experience with tools and concepts essential for further study in computer science and related disciplines.
Recommended Textbook
Invitation to Computer Science 7th Edition by G.Michael Schneider
Available Study Resources on Quizplus
17 Chapters
849 Verified Questions
849 Flashcards
Source URL: https://quizplus.com/study-set/1995

Page 2

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39641
Sample Questions
Q1) The first slide rule appeared around ____.
A) 1183
B) 1622
C) 1882
D) 1945
Answer: B
Q2) What was the major change brought about by the second generation of computing?
Answer: In the late 1950s, the bulky vacuum tube of the first generation of computers was replaced by a single transistor only a few millimeters in size, and memory was now constructed using tiny magnetic cores only 1/50 of an inch in diameter, drastically changing the size and complexity of computers.
Q3) All conceivable problems can be solved algorithmically.
A)True
B)False
Answer: False
Q4) Algorithms are exclusive to the field of computer science.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39642
Sample Questions
Q1) A purely ____ algorithm is sometimes termed a straight-line algorithm.
A) sequential
B) conditional
C) iterative
D) control
Answer: A
Q2) The process of finding a solution to a given problem is called ____________________ discovery.
Answer: algorithm
Q3) A(n) <u>control</u> algorithm executes its instructions in a straight line from top to bottom and then stops._________________________
A)True
B)False
Answer: False
Q4) The ____ loop is an example of a posttest loop.
A) do/while
B) do
C) while
D) if/then/else
Answer: A

Page 4
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39643
Sample Questions
Q1) The study of the efficiency of algorithms is called the ____ of algorithms.
A) design
B) analysis
C) implementation
D) testing
Answer: B
Q2) With sequential search, the <u>bigger</u> the list of items, the more work that must be done to search it._________________________
A)True
B)False
Answer: True
Q3) Part of the job of program ____ is to make clear any assumptions or restrictions about the input size the program was designed to handle.
A) design
B) implementation
C) documentation
D) maintenance
Answer: C
To view all questions and flashcards with answers, click on the resource link above.
5
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39644
Q1) Discuss what a transistor is, how it is used, what it is made of, and how it works.
Q2) ____________________ is the highness or lowness of a sound.
Q3) ____ schemes compress data in a way that does not guarantee that all of the information in the original data can be fully and completely recreated.
A) Randomized compression
B) Decompression
C) Lossy compression
D) Repeat sampling
Q4) A multiplexor chooses one specific input by using an additional set of N lines called ____ lines.
A) control
B) decision
C) selector
D) feedback
Q5) Information is stored in the memory of a computer using the decimal numbering system.
A)True
B)False

6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39645
Sample Questions
Q1) Describe at length what quantum computing is.
Q2) A(n) ____ handles the details of input/output and compensates for any speed differences between I/O devices and other parts of the computer.
A) cache
B) I/O register
C) decoder circuit
D) I/O controller
Q3) The ____ of a disk is the time for the beginning of the desired sector to rotate under the read/write head.
A) latency
B) transfer time
C) frequency
D) seek time
Q4) What is random access memory, and what are its three characteristics?
Q5) What is the most fundamental characteristic of the Von Neumann architecture?
Q6) Examples of <u>volatile</u> storage are mass storage devices such as disks and tapes._________________________
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39646
Sample Questions
Q1) In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
A)True
B)False
Q2) If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.
A) sequential
B) binary
C) op code
D) table
Q3) Typically, all requests to a(n) ____________________ operating system are prioritized.
Q4) The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.
A) Von Neumann
B) modern
C) algorithmic
D) conditional
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39647
Sample Questions
Q1) Generally, it is difficult to intercept transmissions and gain unauthorized access to wireless networks.
A)True
B)False
Q2) A single webpage is identified by a symbolic string called a(n) <u>protocol</u>._________________________
A)True
B)False
Q3) What is IPv6?
Q4) A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.
A) computer group
B) computer network
C) internetwork
D) router
Q5) A(n) ____________________ is an information block with a fixed maximum size that is transmitted through the network as a single unit.
Q6) The individual computers on the network are referred to as
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39648
Sample Questions
Q1) DES is a block cipher and the blocks are <u>48</u> bits long._________________________
A)True
B)False
Q2) When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.
A)True
B)False
Q3) A ____ is an integer greater than 1 that can only be written as the product of itself and 1.
A) prime number
B) primary number
C) natural number
D) whole number
Q4) What is the definition of phishing?
Q5) Provide at least five examples of ways in which you can protect yourself from online threats.
Q6) Explain at length what a Caesar cipher does.
Q7) How does Triple DES improve the security of DES?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39649
Sample Questions
Q1) The object code for a task that needs to be performed often can be stored in a(n)
A) code template
B) code library
C) code container
D) object library
Q2) A ____ stores and fetches values to and from memory cells.
A) random access memory
B) read-only memory
C) flash memory
D) memory cache encoder
Q3) Machine language can use the notation --, //, or # to denote a program comment.
A)True
B)False
Q4) What is the purpose of the feasibility study?
Q5) In early programming languages, conserving machine resources was not an issue.
A)True
B)False
Q6) List four disadvantages of assembly language.
Q7) List four expectations of a program written in a high-level language. Page 11
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39650
Sample Questions
Q1) The majority of business transactions, billions of them per day, are still done on ____________________ code that has now been updated and is likely to continue to run for the foreseeable future.
Q2) ____ is the FORTRAN implementation of "input."
A) FETCH
B) GET
C) READ
D) INPUT
Q3) C++ <u>was</u> designed with engineering applications in mind._________________________
A)True
B)False
Q4) Old computer code that is still in use is known as ____.
A) legacy code
B) spaghetti code
C) Y2K code
D) portable code
Q5) Unlike FORTRAN, COBOL, C, C++, and Ada, which were carefully developed as programming languages, ____________________, a modern, object-oriented language, was almost an accident.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39651
Sample Questions
Q1) The output of a(n) ____________________ is a list of all the tokens contained in a high-level language statement, as well as the classification number of each token found.
Q2) Building two parse trees implies that the parser has demonstrated <u>correctness</u> in two different ways._________________________
A)True
B)False
Q3) The singular goal of compilers is correctness.
A)True
B)False
Q4) A high-level language statement is translated into a single machine language instruction.
A)True
B)False
Q5) A(n) ____ definition defines a nonterminal symbol in terms of itself. A) ambiguous
B) recursive
C) local
D) global
Q6) Explain what metasymbols are and discuss their use as part of BNF rules.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
49 Verified Questions
49 Flashcards
Source URL: https://quizplus.com/quiz/39652
Sample Questions
Q1) The real value of Turing machines as models of computability is in exposing problems that are ____________________.
Q2) Models can only give us information about existing phenomena.
A)True
B)False
Q3) Each time a Turing machine operation is done, <u>four</u> actions take place._________________________
A)True
B)False
Q4) The Turing machine contains two separate units, one for input and one for output.
A)True
B)False
Q5) Describe in detail what a Turing machine includes.
Q6) An extra bit, called a(n) ____, can be attached to the end of a string of bits.
A) state bit
B) odd parity bit
C) inverted bit
D) sentinel bit
Q7) Explain how a Turing machine differs in scale from any real computing agent.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39653
Sample Questions
Q1) The throw of the dice or the drawing of a card is known as ____ behavior.
A) predictable
B) random
C) deterministic
D) conventional
Q2) If we are not happy with our original design using a(n) ____, we only need to change some numerical parameters and rerun the model.
A) physical model
B) simulation
C) virtual model
D) equation
Q3) Building a good model can be a difficult task that requires us to capture, in <u>translational</u> form, all the important factors that influence the behavior of a system._________________________
A)True
B)False
Q4) With what is the field of scientific visualization concerned?
Q5) List at least four reasons for the construction of a simulation model as opposed to the study of the system itself, or a physical replica of the system.
To view all questions and flashcards with answers, click on the resource link above. Page 16
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39654
Sample Questions
Q1) As of August 2014, ____had almost 149 million active registered users, and there were over650 million listings of items for sale during the first quarter of 2014.
A) Groupon
B) eBay
C) PayPal
D) Craigslist
Q2) A row of the table containing data about one instance of an entity is called a ____.
A) tuple
B) triple
C) connection
D) unit
Q3) What is required by the SQL command to create a table?
Q4) A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize access time to the records.
A) sophisticated file manager
B) simple file manager
C) special operating system service
D) specialized file system

Page 17
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39655
Sample Questions
Q1) Complex recognition tasks are easy for computers to perform.
A)True
B)False
Q2) Each ____________________ can be thought of as an extremely simple computational device with a single on/off output.
Q3) Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences.
A) heuristic
B) brute force
C) swarm intelligence
D) back propagation
Q4) The term ____ means "method of assertion."
A) QED
B) forward chaining
C) knowledge engineering
D) modus ponens
Q5) What does the term robot imply?
Q6) Explain in detail what swarm intelligence is.
Q7) What are the required components of an expert system?
To view all questions and flashcards with answers, click on the resource link above. Page 18

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39656
Sample Questions
Q1) Typically, a ____ has its own dedicated random access memory where it stores its image data and which is separate from primary memory.
A) CPU
B) PPU
C) GPU
D) MPU
Q2) Distinguish movies from video games in terms of their interactive environments.
Q3) Using a CGI technique called ____, a human animator only needs to produce the first frame, containing the starting location of the object; the last frame, containing the final location of the object; and the elapsed time.
A) blocking
B) stop-framing
C) keyframing
D) mid-framing
Q4) <u>Culls</u> are fully modeled and fully rendered objects stored in a video libraryin video memory._________________________
A)True
B)False
Q5) Explain the animation technique used in the 1933 film King Kong.
To view all questions and flashcards with answers, click on the resource link above. Page 19
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/39657
Sample Questions
Q1) The "hacker ethic" makes the claim that ____.
A) all hacking is positive hacking
B) information sharing is a powerful positive good
C) hackers are ethically ok as long as they have fun
D) hacking is acceptable as long as it is a solitary activity
Q2) Explain what WikiLeaks is, how it operates, and what its goal is.
Q3) A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.
Q4) Kant came up with ____ that characterized the duties we humans have to each other.
A) ten laws
B) a mathematical formulation
C) categorical imperatives
D) an algorithm
Q5) Explain what sexting is.
Q6) The first step in the paramedic method is to ____.
A) ask what is at stake
B) identify stakeholders
C) identify duties and responsibilities
D) think of analogies

20
To view all questions and flashcards with answers, click on the resource link above.
Page 21