

Introduction to Computer Science
Exam Answer Key

Course Introduction
Introduction to Computer Science offers a foundational overview of computational thinking, programming, and the core principles that underpin modern computing. This course explores topics such as algorithms, data structures, problem-solving strategies, hardware and software components, and the societal impact of computing. Through hands-on programming exercises and projects, students will learn the basics of coding using a high-level language, understand how computers process information, and develop logical reasoning skills essential for further study in computer science and related fields.
Recommended Textbook
Computer Science An Overview 12th Edition by Glenn Brookshear
Available Study Resources on Quizplus
12 Chapters
652 Verified Questions
652 Flashcards
Source URL: https://quizplus.com/study-set/833
Page 2

Chapter 1: Data Representation
Available Study Resources on Quizplus for this Chatper
64 Verified Questions
64 Flashcards
Source URL: https://quizplus.com/quiz/16548
Sample Questions
Q1) Which of the following data storage systems provides the most efficient random access to individual data items?
A) Main memory
B) Magnetic disk
C) CDs/DVDs
D) Flash drives
Answer: A
Q2) Describe how a computer can produce an incorrect answer when performing numerical computations even though it has not malfunctioned.
Answer: Most students will probably refer to overflow and truncation errors.
Q3) Which of the following is the binary representation of 6 5/8?
A) 110.11
B) 10.011
C) 110.101
D) 100.101
Answer: C
Q4) A7DF is the hexadecimal representation for what bit pattern?
Answer: 1010 0111 1101 1111
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Data Representation
Available Study Resources on Quizplus for this Chatper
63 Verified Questions
63 Flashcards
Source URL: https://quizplus.com/quiz/16549
Sample Questions
Q1) Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?
A) AND
B) OR
C) XOR
Answer: A
Q2) What is the largest positive integer that can be represented in a two's complement system in which each value is represented by eight bits?
Answer: 127 (represented by 01111111)
Q3) In a two's complement system,what value can be added to any other value without causing an overflow? How many values in the system have this property? Explain your answer.
Answer: Adding the value 0 to any other value will not produce an overflow.However,if m is the largest positive integer that can be represented in the system,then any value in the range 1 to m will produce an overflow when added to m,and any value in the range -1 to -( m + 1)will produce an overflow when added to -( m + 1).
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Operating Systems
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/16550
Sample Questions
Q1) Multitasking in a computer with only one CPU is accomplished by a technique called
A) Bootstrapping
B) Batch processing
C) Multiprogramming
Answer: C
Q2) In the sense of the term virtual memory,give an argument that multiprogramming creates virtual CPUs.
Answer: The term virtual memory refers to the illusion of a memory space that is larger than that actually present.This illusion is created by the operating system.Multiprogramming is a technique used by operating systems to create the illusion of more CPUs than are actually present.
Q3) Which of the following components of an operating system maintains the directory system?
A) Device drivers
B) File manager
C) Memory manager Answer: B
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Networks and the Internet
Available Study Resources on Quizplus for this Chatper
62 Verified Questions
62 Flashcards
Source URL: https://quizplus.com/quiz/16551
Sample Questions
Q1) Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?
A) Application
B) Transport
C) Network
D) Link
Q2) Identify two types of VoIP devices.
Q3) Identify two protocols used in networks to determine the right to transmit an original message.
A. _________________
B. _________________
Q4) What are two protocols for implementing the transport level in the "TCP/IP hierarchy"?
A. _____________
B. ______________
Q5) Which of the following is not an email related protocol?
A) HTTP
B) POP3
C) IMAP
D) SMTP
To view all questions and flashcards with answers, click on the resource link above. Page 6
Chapter 5: Algorithms
Available Study Resources on Quizplus for this Chatper
53 Verified Questions
53 Flashcards
Source URL: https://quizplus.com/quiz/16552
Sample Questions
Q1) Which of the following is a loop invariant at the point at which the test for termination is performed in the following loop structure? X = 3
Repeat:
X = X + 2
Until (X > 5)
A) X > 5
B)X < 8
C) X 5
D)X 6
Q2) Which of the following is an activity?
A) Algorithm
B) Program
C) Process
Q3) When searching for the entry X within the list
R,S,T,U,V,W,Z
how many entries will be considered before discovering that the entry is not present? (Note that the list is in alphabetical order.)

To view all questions and flashcards with answers, click on the resource link above. Page 7
Chapter 6: Programming Languages
Available Study Resources on Quizplus for this Chatper
54 Verified Questions
54 Flashcards
Source URL: https://quizplus.com/quiz/16553
Sample Questions
Q1) Explain the distinction between the imperative and declarative programming paradigms.
Q2) List four data types that occur as primitive types in many high-level programming languages.

Q3) Which of the following is a means of defining similar yet different classes in an object-oriented program?
A) Inheritance
B) Parsing
C) Coercion
D) Code optimization
Q4) Which of the following is not associated with the concept of data type?
A) Coercion
B) Boolean
C) Operator precedence
D) Strongly typed language
Q5) In addition to the function's name,what other information is contained in a typical function header?
To view all questions and flashcards with answers, click on the resource link above. Page 8
Chapter 7: Software Engineering
Available Study Resources on Quizplus for this Chatper
54 Verified Questions
54 Flashcards
Source URL: https://quizplus.com/quiz/16554
Sample Questions
Q1) Identify two legal techniques that have been applied to protect a software developer's ownership rights.

Q2) Explain why inheritance may not be the best way of implementing generalizations among classes.
Q3) Which of the following is a means of controlling the complexity of a software system?
A) CRC cards
B) Modularity
C) Specifications
D) Beta testing
Q4) In each case below indicate whether the activity is primarily top-down or bottom-up.
A.___________________ Building software from previously constructed components
B.___________________ Dividing a module into smaller modules to obtain greater cohesion
C.___________________ Designing a dataflow diagram by successively adding more specificity
Q5) Give an example of a one-to-many relationship.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Data Abstractions
Available Study Resources on Quizplus for this Chatper
53 Verified Questions
53 Flashcards
Source URL: https://quizplus.com/quiz/16555
Sample Questions
Q1) The table below represents a portion of a computer's main memory containing a linked list.Each entry consists of two cells,the first being data,the second being a pointer to the next entry.If the null pointer is represented by 00 and the list's head pointer contains 52,modify the memory cells so the data at address 50 replaces the second entry in the list.
\(\begin{array} { c c }
\text { Address } & \text { Content } \\
50 & \mathrm { AA } \\
51 & 00 \\
52 & \mathrm { BB } \\
53 & 58 \\
54 & \mathrm { CC } \\
55 & 00 \\
56 & \mathrm { DD } \\
57 & 00 \\
58 & \mathrm { EE } \\
59 & 54
\end{array}\)
Q2) What condition indicates that a linked list is empty?
Q3) Why is a queue normally implemented as a circular queue?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Database Systems
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/16556
Sample Questions
Q1) Identify two database models.
Q2) Describe the wound-wait protocol.
Q3) Suppose a relation X had the attributes PartID (part identification number),StockGoal (quantity held when fully stocked),and CurrentQuantity (quantity actually in stock).Complete the following statement to obtain information about those parts that are not fully stocked. Result ? SELECT from X where
Q4) What information is available from a relational database containing one relation with the attributes Name,Employee identification number,and Address that is not available from a database containing two relations,one with attributes Name and Address and the other with attributes Address and Employee identification number? Explain your answer.
Q5) Which of the following data mining techniques would be applied when trying to identify traits that characterize the citizens of a democracy who fail to vote?
A) Class description
B) Class discrimination
C) Cluster analysis
D) Association analysis
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Computer Graphics
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/16557
Sample Questions
Q1) Which of the following is not contained in a scene graph?
A) Models of the objects in the scene
B) Information about the camera
C) Information about lighting
D) The view volume
Q2) The ____________ represents the portion of the projection plane that will contribute to the final image.A bit map of that image is stored in the ___________.
Q3) Motion capture is a means of applying
A) A global lighting model
B) A local lighting model
C) Dynamics
D) Kinematics
Q4) Another name for scan conversion is ____________.
Q5) Which of the following is the simplest shading technique?
A) Phong shading
B) Flat shading
C) Gouraud shading
D) Bump mapping
Q6) Compare various approaches to shading.
Q7) A line perpendicular to a surface is called a __________.
To view all questions and flashcards with answers, click on the resource link above. Page 12
Chapter 11: Artificial Intelligence
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/16558
Sample Questions
Q1) How many nodes would be in the search tree generated by a heuristic search when solving the eight-puzzle from the starting configuration below if the-number-of-tiles-out-of-place were used as the heuristic?
1 2
4 5 3
7 8 6

Q2) At what "stage" of analysis is the meaning of a pronoun such as he or she identified?
A) Syntactic analysis
B) Semantic analysis
C) Contextual analysis
Q3) What is the frame problem?
Q4) What is the effective input of an artificial neuron whose inputs are 1,0,1 and whose associated connection weights are 3,-3,-1,respectively?
Q5) A heuristic is applied during a search process in hopes of producing a
A) Depth-first search
B) Breadth-first search
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Theory of Computation
Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/16559
Sample Questions
Q1) Complete the following sentence. An NP-complete problem is a problem in NP for which
Q2) If we were using RSA encryption with the private keys n = 133 and d = 5,what would be the decrypted version of the encrypted message whose bit pattern is 11?
Q3) Place an X in the blank before each of the following statements that guarantees that a problem is in P.
_____ The problem is in O(n²).
_____ The problem is in O(2?).
_____ The problem is in O(log? n).
_____ The problem is in O(n³).
Q4) Which of the following statements is false?
A) If a problem can be solved by a Bare Bones program, then it can be solved by a Turing machine.
B) If a problem can be solved by a Turing machine, then it can be solved by a Bare Bones program.
C) The halting problem cannot be solved by a Bare Bones program.
D) The halting problem can be solved only by using a universal programming language.
To view all questions and flashcards with answers, click on the resource link above. Page 14