Introduction to Computer Science Exam Answer Key - 652 Verified Questions

Page 1


Introduction to Computer Science

Exam Answer Key

Course Introduction

Introduction to Computer Science offers a foundational overview of computational thinking, programming, and the core principles that underpin modern computing. This course explores topics such as algorithms, data structures, problem-solving strategies, hardware and software components, and the societal impact of computing. Through hands-on programming exercises and projects, students will learn the basics of coding using a high-level language, understand how computers process information, and develop logical reasoning skills essential for further study in computer science and related fields.

Recommended Textbook

Computer Science An Overview 12th Edition by Glenn Brookshear

Available Study Resources on Quizplus

12 Chapters

652 Verified Questions

652 Flashcards

Source URL: https://quizplus.com/study-set/833

Page 2

Chapter 1: Data Representation

Available Study Resources on Quizplus for this Chatper

64 Verified Questions

64 Flashcards

Source URL: https://quizplus.com/quiz/16548

Sample Questions

Q1) Which of the following data storage systems provides the most efficient random access to individual data items?

A) Main memory

B) Magnetic disk

C) CDs/DVDs

D) Flash drives

Answer: A

Q2) Describe how a computer can produce an incorrect answer when performing numerical computations even though it has not malfunctioned.

Answer: Most students will probably refer to overflow and truncation errors.

Q3) Which of the following is the binary representation of 6 5/8?

A) 110.11

B) 10.011

C) 110.101

D) 100.101

Answer: C

Q4) A7DF is the hexadecimal representation for what bit pattern?

Answer: 1010 0111 1101 1111

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Data Representation

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/16549

Sample Questions

Q1) Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?

A) AND

B) OR

C) XOR

Answer: A

Q2) What is the largest positive integer that can be represented in a two's complement system in which each value is represented by eight bits?

Answer: 127 (represented by 01111111)

Q3) In a two's complement system,what value can be added to any other value without causing an overflow? How many values in the system have this property? Explain your answer.

Answer: Adding the value 0 to any other value will not produce an overflow.However,if m is the largest positive integer that can be represented in the system,then any value in the range 1 to m will produce an overflow when added to m,and any value in the range -1 to -( m + 1)will produce an overflow when added to -( m + 1).

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Operating Systems

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/16550

Sample Questions

Q1) Multitasking in a computer with only one CPU is accomplished by a technique called

A) Bootstrapping

B) Batch processing

C) Multiprogramming

Answer: C

Q2) In the sense of the term virtual memory,give an argument that multiprogramming creates virtual CPUs.

Answer: The term virtual memory refers to the illusion of a memory space that is larger than that actually present.This illusion is created by the operating system.Multiprogramming is a technique used by operating systems to create the illusion of more CPUs than are actually present.

Q3) Which of the following components of an operating system maintains the directory system?

A) Device drivers

B) File manager

C) Memory manager Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Networks and the Internet

Available Study Resources on Quizplus for this Chatper

62 Verified Questions

62 Flashcards

Source URL: https://quizplus.com/quiz/16551

Sample Questions

Q1) Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?

A) Application

B) Transport

C) Network

D) Link

Q2) Identify two types of VoIP devices.

Q3) Identify two protocols used in networks to determine the right to transmit an original message.

A. _________________

B. _________________

Q4) What are two protocols for implementing the transport level in the "TCP/IP hierarchy"?

A. _____________

B. ______________

Q5) Which of the following is not an email related protocol?

A) HTTP

B) POP3

C) IMAP

D) SMTP

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Algorithms

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/16552

Sample Questions

Q1) Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3

Repeat:

X = X + 2

Until (X > 5)

A) X > 5

B)X < 8

C) X 5

D)X 6

Q2) Which of the following is an activity?

A) Algorithm

B) Program

C) Process

Q3) When searching for the entry X within the list

R,S,T,U,V,W,Z

how many entries will be considered before discovering that the entry is not present? (Note that the list is in alphabetical order.)

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Programming Languages

Available Study Resources on Quizplus for this Chatper

54 Verified Questions

54 Flashcards

Source URL: https://quizplus.com/quiz/16553

Sample Questions

Q1) Explain the distinction between the imperative and declarative programming paradigms.

Q2) List four data types that occur as primitive types in many high-level programming languages.

Q3) Which of the following is a means of defining similar yet different classes in an object-oriented program?

A) Inheritance

B) Parsing

C) Coercion

D) Code optimization

Q4) Which of the following is not associated with the concept of data type?

A) Coercion

B) Boolean

C) Operator precedence

D) Strongly typed language

Q5) In addition to the function's name,what other information is contained in a typical function header?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Software Engineering

Available Study Resources on Quizplus for this Chatper

54 Verified Questions

54 Flashcards

Source URL: https://quizplus.com/quiz/16554

Sample Questions

Q1) Identify two legal techniques that have been applied to protect a software developer's ownership rights.

Q2) Explain why inheritance may not be the best way of implementing generalizations among classes.

Q3) Which of the following is a means of controlling the complexity of a software system?

A) CRC cards

B) Modularity

C) Specifications

D) Beta testing

Q4) In each case below indicate whether the activity is primarily top-down or bottom-up.

A.___________________ Building software from previously constructed components

B.___________________ Dividing a module into smaller modules to obtain greater cohesion

C.___________________ Designing a dataflow diagram by successively adding more specificity

Q5) Give an example of a one-to-many relationship.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Data Abstractions

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/16555

Sample Questions

Q1) The table below represents a portion of a computer's main memory containing a linked list.Each entry consists of two cells,the first being data,the second being a pointer to the next entry.If the null pointer is represented by 00 and the list's head pointer contains 52,modify the memory cells so the data at address 50 replaces the second entry in the list.

\(\begin{array} { c c }

\text { Address } & \text { Content } \\

50 & \mathrm { AA } \\

51 & 00 \\

52 & \mathrm { BB } \\

53 & 58 \\

54 & \mathrm { CC } \\

55 & 00 \\

56 & \mathrm { DD } \\

57 & 00 \\

58 & \mathrm { EE } \\

59 & 54

\end{array}\)

Q2) What condition indicates that a linked list is empty?

Q3) Why is a queue normally implemented as a circular queue?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Database Systems

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/16556

Sample Questions

Q1) Identify two database models.

Q2) Describe the wound-wait protocol.

Q3) Suppose a relation X had the attributes PartID (part identification number),StockGoal (quantity held when fully stocked),and CurrentQuantity (quantity actually in stock).Complete the following statement to obtain information about those parts that are not fully stocked. Result ? SELECT from X where

Q4) What information is available from a relational database containing one relation with the attributes Name,Employee identification number,and Address that is not available from a database containing two relations,one with attributes Name and Address and the other with attributes Address and Employee identification number? Explain your answer.

Q5) Which of the following data mining techniques would be applied when trying to identify traits that characterize the citizens of a democracy who fail to vote?

A) Class description

B) Class discrimination

C) Cluster analysis

D) Association analysis

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Computer Graphics

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/16557

Sample Questions

Q1) Which of the following is not contained in a scene graph?

A) Models of the objects in the scene

B) Information about the camera

C) Information about lighting

D) The view volume

Q2) The ____________ represents the portion of the projection plane that will contribute to the final image.A bit map of that image is stored in the ___________.

Q3) Motion capture is a means of applying

A) A global lighting model

B) A local lighting model

C) Dynamics

D) Kinematics

Q4) Another name for scan conversion is ____________.

Q5) Which of the following is the simplest shading technique?

A) Phong shading

B) Flat shading

C) Gouraud shading

D) Bump mapping

Q6) Compare various approaches to shading.

Q7) A line perpendicular to a surface is called a __________.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Artificial Intelligence

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/16558

Sample Questions

Q1) How many nodes would be in the search tree generated by a heuristic search when solving the eight-puzzle from the starting configuration below if the-number-of-tiles-out-of-place were used as the heuristic?

1 2

4 5 3

7 8 6

Q2) At what "stage" of analysis is the meaning of a pronoun such as he or she identified?

A) Syntactic analysis

B) Semantic analysis

C) Contextual analysis

Q3) What is the frame problem?

Q4) What is the effective input of an artificial neuron whose inputs are 1,0,1 and whose associated connection weights are 3,-3,-1,respectively?

Q5) A heuristic is applied during a search process in hopes of producing a

A) Depth-first search

B) Breadth-first search

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Theory of Computation

Available Study Resources on Quizplus for this Chatper

51 Verified Questions

51 Flashcards

Source URL: https://quizplus.com/quiz/16559

Sample Questions

Q1) Complete the following sentence. An NP-complete problem is a problem in NP for which

Q2) If we were using RSA encryption with the private keys n = 133 and d = 5,what would be the decrypted version of the encrypted message whose bit pattern is 11?

Q3) Place an X in the blank before each of the following statements that guarantees that a problem is in P.

_____ The problem is in O(n²).

_____ The problem is in O(2?).

_____ The problem is in O(log? n).

_____ The problem is in O(n³).

Q4) Which of the following statements is false?

A) If a problem can be solved by a Bare Bones program, then it can be solved by a Turing machine.

B) If a problem can be solved by a Turing machine, then it can be solved by a Bare Bones program.

C) The halting problem cannot be solved by a Bare Bones program.

D) The halting problem can be solved only by using a universal programming language.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook