Computing Concepts Textbook Exam Questions - 849 Verified Questions

Page 1


Course Introduction

Computing Concepts

Textbook Exam Questions

Computing Concepts introduces students to the foundational principles and practices of computing, providing an overview of key topics such as algorithms, data structures, computer hardware and software, operating systems, networking, and the basics of programming languages. The course emphasizes understanding how computers solve problems, the role of logic and abstraction in computing, and the impact of computational thinking on various fields. Students will develop analytical skills and gain hands-on experience with tools and concepts essential for further study in computer science and related disciplines.

Recommended Textbook

Invitation to Computer Science 7th Edition by G.Michael Schneider

Available Study Resources on Quizplus

17 Chapters

849 Verified Questions

849 Flashcards

Source URL: https://quizplus.com/study-set/1995

Page 2

Chapter 1: An Introduction to Computer Science

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39641

Sample Questions

Q1) The first slide rule appeared around ____.

A) 1183

B) 1622

C) 1882

D) 1945

Answer: B

Q2) What was the major change brought about by the second generation of computing?

Answer: In the late 1950s, the bulky vacuum tube of the first generation of computers was replaced by a single transistor only a few millimeters in size, and memory was now constructed using tiny magnetic cores only 1/50 of an inch in diameter, drastically changing the size and complexity of computers.

Q3) All conceivable problems can be solved algorithmically.

A)True

B)False

Answer: False

Q4) Algorithms are exclusive to the field of computer science.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Algorithm Discovery and Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39642

Sample Questions

Q1) A purely ____ algorithm is sometimes termed a straight-line algorithm.

A) sequential

B) conditional

C) iterative

D) control

Answer: A

Q2) The process of finding a solution to a given problem is called ____________________ discovery.

Answer: algorithm

Q3) A(n) <u>control</u> algorithm executes its instructions in a straight line from top to bottom and then stops._________________________

A)True

B)False

Answer: False

Q4) The ____ loop is an example of a posttest loop.

A) do/while

B) do

C) while

D) if/then/else

Answer: A

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: The Efficiency of Algorithms

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39643

Sample Questions

Q1) The study of the efficiency of algorithms is called the ____ of algorithms.

A) design

B) analysis

C) implementation

D) testing

Answer: B

Q2) With sequential search, the <u>bigger</u> the list of items, the more work that must be done to search it._________________________

A)True

B)False

Answer: True

Q3) Part of the job of program ____ is to make clear any assumptions or restrictions about the input size the program was designed to handle.

A) design

B) implementation

C) documentation

D) maintenance

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: The Building Blocks: Binary Numbers, Boolean

Logic, and Gates

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39644

Sample Questions

Q1) Discuss what a transistor is, how it is used, what it is made of, and how it works.

Q2) ____________________ is the highness or lowness of a sound.

Q3) ____ schemes compress data in a way that does not guarantee that all of the information in the original data can be fully and completely recreated.

A) Randomized compression

B) Decompression

C) Lossy compression

D) Repeat sampling

Q4) A multiplexor chooses one specific input by using an additional set of N lines called ____ lines.

A) control

B) decision

C) selector

D) feedback

Q5) Information is stored in the memory of a computer using the decimal numbering system.

A)True

B)False

6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Computer Systems Organization

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39645

Sample Questions

Q1) Describe at length what quantum computing is.

Q2) A(n) ____ handles the details of input/output and compensates for any speed differences between I/O devices and other parts of the computer.

A) cache

B) I/O register

C) decoder circuit

D) I/O controller

Q3) The ____ of a disk is the time for the beginning of the desired sector to rotate under the read/write head.

A) latency

B) transfer time

C) frequency

D) seek time

Q4) What is random access memory, and what are its three characteristics?

Q5) What is the most fundamental characteristic of the Von Neumann architecture?

Q6) Examples of <u>volatile</u> storage are mass storage devices such as disks and tapes._________________________

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: An Introduction to System Software and Virtual Machines

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39646

Sample Questions

Q1) In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.

A)True

B)False

Q2) If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential

B) binary

C) op code

D) table

Q3) Typically, all requests to a(n) ____________________ operating system are prioritized.

Q4) The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann

B) modern

C) algorithmic

D) conditional

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Computer Networks and Cloud Computing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39647

Sample Questions

Q1) Generally, it is difficult to intercept transmissions and gain unauthorized access to wireless networks.

A)True

B)False

Q2) A single webpage is identified by a symbolic string called a(n) <u>protocol</u>._________________________

A)True

B)False

Q3) What is IPv6?

Q4) A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

A) computer group

B) computer network

C) internetwork

D) router

Q5) A(n) ____________________ is an information block with a fixed maximum size that is transmitted through the network as a single unit.

Q6) The individual computers on the network are referred to as

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Information Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39648

Sample Questions

Q1) DES is a block cipher and the blocks are <u>48</u> bits long._________________________

A)True

B)False

Q2) When a user attempts to log on to the machine, a hash function reads the user ID and checks that the password matches the password for that user in the password file.

A)True

B)False

Q3) A ____ is an integer greater than 1 that can only be written as the product of itself and 1.

A) prime number

B) primary number

C) natural number

D) whole number

Q4) What is the definition of phishing?

Q5) Provide at least five examples of ways in which you can protect yourself from online threats.

Q6) Explain at length what a Caesar cipher does.

Q7) How does Triple DES improve the security of DES?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Introduction to High-Level Language Programming

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39649

Sample Questions

Q1) The object code for a task that needs to be performed often can be stored in a(n)

A) code template

B) code library

C) code container

D) object library

Q2) A ____ stores and fetches values to and from memory cells.

A) random access memory

B) read-only memory

C) flash memory

D) memory cache encoder

Q3) Machine language can use the notation --, //, or # to denote a program comment.

A)True

B)False

Q4) What is the purpose of the feasibility study?

Q5) In early programming languages, conserving machine resources was not an issue.

A)True

B)False

Q6) List four disadvantages of assembly language.

Q7) List four expectations of a program written in a high-level language. Page 11

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: The Tower of Babel

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39650

Sample Questions

Q1) The majority of business transactions, billions of them per day, are still done on ____________________ code that has now been updated and is likely to continue to run for the foreseeable future.

Q2) ____ is the FORTRAN implementation of "input."

A) FETCH

B) GET

C) READ

D) INPUT

Q3) C++ <u>was</u> designed with engineering applications in mind._________________________

A)True

B)False

Q4) Old computer code that is still in use is known as ____.

A) legacy code

B) spaghetti code

C) Y2K code

D) portable code

Q5) Unlike FORTRAN, COBOL, C, C++, and Ada, which were carefully developed as programming languages, ____________________, a modern, object-oriented language, was almost an accident.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Compilers and Language Translation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39651

Sample Questions

Q1) The output of a(n) ____________________ is a list of all the tokens contained in a high-level language statement, as well as the classification number of each token found.

Q2) Building two parse trees implies that the parser has demonstrated <u>correctness</u> in two different ways._________________________

A)True

B)False

Q3) The singular goal of compilers is correctness.

A)True

B)False

Q4) A high-level language statement is translated into a single machine language instruction.

A)True

B)False

Q5) A(n) ____ definition defines a nonterminal symbol in terms of itself. A) ambiguous

B) recursive

C) local

D) global

Q6) Explain what metasymbols are and discuss their use as part of BNF rules.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Models of Computation

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/39652

Sample Questions

Q1) The real value of Turing machines as models of computability is in exposing problems that are ____________________.

Q2) Models can only give us information about existing phenomena.

A)True

B)False

Q3) Each time a Turing machine operation is done, <u>four</u> actions take place._________________________

A)True

B)False

Q4) The Turing machine contains two separate units, one for input and one for output.

A)True

B)False

Q5) Describe in detail what a Turing machine includes.

Q6) An extra bit, called a(n) ____, can be attached to the end of a string of bits.

A) state bit

B) odd parity bit

C) inverted bit

D) sentinel bit

Q7) Explain how a Turing machine differs in scale from any real computing agent.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Simulation and Modeling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39653

Sample Questions

Q1) The throw of the dice or the drawing of a card is known as ____ behavior.

A) predictable

B) random

C) deterministic

D) conventional

Q2) If we are not happy with our original design using a(n) ____, we only need to change some numerical parameters and rerun the model.

A) physical model

B) simulation

C) virtual model

D) equation

Q3) Building a good model can be a difficult task that requires us to capture, in <u>translational</u> form, all the important factors that influence the behavior of a system._________________________

A)True

B)False

Q4) With what is the field of scientific visualization concerned?

Q5) List at least four reasons for the construction of a simulation model as opposed to the study of the system itself, or a physical replica of the system.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Electronic Commerce, Databases, and Personal

Privacy

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39654

Sample Questions

Q1) As of August 2014, ____had almost 149 million active registered users, and there were over650 million listings of items for sale during the first quarter of 2014.

A) Groupon

B) eBay

C) PayPal

D) Craigslist

Q2) A row of the table containing data about one instance of an entity is called a ____.

A) tuple

B) triple

C) connection

D) unit

Q3) What is required by the SQL command to create a table?

Q4) A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize access time to the records.

A) sophisticated file manager

B) simple file manager

C) special operating system service

D) specialized file system

Page 17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Artificial Intelligence

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39655

Sample Questions

Q1) Complex recognition tasks are easy for computers to perform.

A)True

B)False

Q2) Each ____________________ can be thought of as an extremely simple computational device with a single on/off output.

Q3) Intelligent searching involves applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes those differences.

A) heuristic

B) brute force

C) swarm intelligence

D) back propagation

Q4) The term ____ means "method of assertion."

A) QED

B) forward chaining

C) knowledge engineering

D) modus ponens

Q5) What does the term robot imply?

Q6) Explain in detail what swarm intelligence is.

Q7) What are the required components of an expert system?

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: Computer Graphics and Entertainment: Movies, Games,

and Virtual Communities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39656

Sample Questions

Q1) Typically, a ____ has its own dedicated random access memory where it stores its image data and which is separate from primary memory.

A) CPU

B) PPU

C) GPU

D) MPU

Q2) Distinguish movies from video games in terms of their interactive environments.

Q3) Using a CGI technique called ____, a human animator only needs to produce the first frame, containing the starting location of the object; the last frame, containing the final location of the object; and the elapsed time.

A) blocking

B) stop-framing

C) keyframing

D) mid-framing

Q4) <u>Culls</u> are fully modeled and fully rendered objects stored in a video libraryin video memory._________________________

A)True

B)False

Q5) Explain the animation technique used in the 1933 film King Kong.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: Making Decisions About Computers,

Information, and Society

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39657

Sample Questions

Q1) The "hacker ethic" makes the claim that ____.

A) all hacking is positive hacking

B) information sharing is a powerful positive good

C) hackers are ethically ok as long as they have fun

D) hacking is acceptable as long as it is a solitary activity

Q2) Explain what WikiLeaks is, how it operates, and what its goal is.

Q3) A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.

Q4) Kant came up with ____ that characterized the duties we humans have to each other.

A) ten laws

B) a mathematical formulation

C) categorical imperatives

D) an algorithm

Q5) Explain what sexting is.

Q6) The first step in the paramedic method is to ____.

A) ask what is at stake

B) identify stakeholders

C) identify duties and responsibilities

D) think of analogies

20

To view all questions and flashcards with answers, click on the resource link above.

Page 21

Turn static files into dynamic content formats.

Create a flipbook