Anda di halaman 1dari 137

CS chapter 1 PRACTICE

True/False
Indicate whether the sentence or statement is true or false.
ARPA was created by Eisenhower as a direct response to the possible threat
1. posed by the Russian launch of Sputnik.
T
ANSWER:
NOTES:
REF:

30

The UNIVAC incorrectly predicted the outcome of the 1952 election.


2.
F
ANSWER:
NOTES:
REF:

15

In 1998, Netscape repudiated the open source movement, and suppressed the
3. source code for its browser.
F
ANSWER:
NOTES:
REF:

34

The need to be aware of the complex mix of technological requirements and


4. historical forces is part of a computer scientists job.
T
ANSWER:
NOTES:
REF:

36

In the 1980s Microsoft refused to write application software for Apple.


5.
F
ANSWER:
NOTES:
REF:

29

The Altair bus evolved into a specialized device that only a few
6. hardware/software companies could use.
F
ANSWER:
NOTES:
REF:

23

IBM built the first electronic computer.


7.
F
ANSWER:
NOTES:
REF:

The Jacquard loom addressed a problem that was directly related to issues in
8. navigation.
F
ANSWER:
NOTES:
REF:

Application programs are geared toward an end user rather than the programmer.
9.
T
ANSWER:
NOTES:
REF:

18

The Intel 4004 was named after the number of transistors aboard.
10.
T
ANSWER:
NOTES:
REF:

20

Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc.
11.
F
ANSWER:
NOTES:
REF:

25

IBM chose Microsoft to develop its PC operating system.


12.
T
ANSWER:
NOTES:
REF:

26

With the introduction of the semiconductor, both the cost and size of computers
13. were reduced while speed and reliability were improved.
T
ANSWER:
NOTES:
REF:

17

IBM preferred selling its PC through an established commercial sales force


14. rather than retail outlets.
F
ANSWER:
NOTES:

REF:

25

The Apple II gained broad acceptance due to the ease with which programmers
15. could write applications for it.
T
ANSWER:
NOTES:
REF:

24

Most consumers asserted that the user-interface to DOS was intuitive.


16.
F
ANSWER:
NOTES:
REF:

26

Charles Babbage managed to design a machine that captured the key working
17. elements of the modern electronic computer.
T
ANSWER:
NOTES:
REF:

Only 10 percent of the software running on all the computing devices of the
18. world comes from Microsoft.
T
ANSWER:
NOTES:
REF:

35

Code cannot be automatically generated by object-oriented programs


19.
F
ANSWER:

NOTES:
REF:

32

A scalable system allows a company to add components as business and


20. computing needs increase.
T
ANSWER:
NOTES:
REF:

16

The Internet is a network of networks.


21.
T
ANSWER:
NOTES:
REF:

31

The Xerox Alto featured graphics, menus, icons, windows, and a mouse.
22.
T
ANSWER:
NOTES:
REF:

27

With respect to ease of use, the BASIC programming language is superior to


23. machine code language.
T
ANSWER:
NOTES:
REF:

22

The Von Neumann machines operation is governed by a program loaded into


24. memory.

T
ANSWER:
NOTES:
REF:

11

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
According to general consensus, which of the following companies won the
25. mainframe battle of the first electronic computer generation?
a. IBM
c. Honeywell
b. Remington Rand
d. RCA
A
ANSWER:
NOTES:
REF:

15

Using the Berners-Lee protocols, Marc Andreesen created the browser that had
26. the most impact beyond the walls of academia: ____.
a. Internet Explorer
c. Mosaic
b. Next
d. Impact
C
ANSWER:
NOTES:
REF:

33

ENIAC was a functioning and useful computer that could perform both
27. arithmetic and ____ operations.
a. standard
c. linguistic
b. surgical
d. logical
D
ANSWER:
NOTES:
REF:

11

Which of the following technologies made electronic computing possible?


c. vacuum tubes
28. a. reusable pins
b. punch cards
d. keyboards
C
ANSWER:
NOTES:
REF:

10

The loose collection of networks called the Internet is the short form of which
29. of the following words?
a. internetwork
c. interarpanet
b. internexus
d. interconnect
A
ANSWER:
NOTES:
REF:

31

Based on low cost, available source code, and reputed reliability, which of the
30. following operating systems presents the greatest competitive threat to Windows?
a. Crescent
c. Linux
b. Star
d. OS/2
C
ANSWER:
NOTES:
REF:

34

In 1823 ____ invented a mechanical device that did addition, subtraction,


31. multiplication, and division of 6-digit numbers.
a. Gottfried Leibniz
c. Charles Babbage
b. Blaise Pascal
d. Thomas Jefferson
C
ANSWER:
NOTES:

REF:

In its antitrust suit with the government, Microsoft claimed which of the
32. following programs was an integral part of the operating system?
a. Mosaic
c. Navigator
b. Internet Explorer
d. MS-Word
B
ANSWER:
NOTES:
REF:

34

Both the Jacquard loom and the player piano had a ____.
c. disk drive
33. a. stored program
b. monitor
d. keyboard
A
ANSWER:
NOTES:
REF:

Which of the following war-time activities caused the U.S. Navy Board of
34. Ordinance to sponsor the development of the first modern electronic computer?
a. ship building
c. weapons development
b. aerial reconnaissance
d. map-making
C
ANSWER:
NOTES:
REF:

10

The integration of Internet Explorer with the dominant Windows operating


35. system was the turning point in what came to be known as the ____.
a. Internet affair
c. code conflict
b. browser wars
d. network nightmare
B
ANSWER:

NOTES:
REF:

34

In Western society, you can probably credit the 1622 invention of the ____ as the
36. beginning of the solution of complex mathematical problems by mechanical
devices with moving parts.
a. abacus
c. logarithm
b. slide rule
d. transit
B
ANSWER:
NOTES:
REF:

Which of the following operating systems was developed jointly by IBM and
37. Microsoft?
a. NOS
c. Linux
b. OS/2
d. Unix
B
ANSWER:
NOTES:
REF:

29

Which of the following was the first commercially viable computer?


c. Mark I
38. a. UNIVAC
b. ENIAC
d. EDVAC
A
ANSWER:
NOTES:
REF:

14

In the fifth generation of electronic computing, modular approaches to coding,


39. such as ____ , facilitate larger, more complex, and more quickly and reliably
delivered software products.
a. assembly programming
c. object-oriented programming
b. machine programming
d. binary programming

C
ANSWER:
NOTES:
REF:

32

Herman Hollerith introduced electromechanical counting equipment using ____


40. as input.
a. voice patterns
c. magnetic tape
b. punch cards
d. keyboard entry
B
ANSWER:
NOTES:
REF:

____ involves dividing messages into blocks that can be reassembled at their
41. destination, with each block possibly following a different path.
a. Multiplexing
c. Packet switching
b. Linking
d. Decoding
C
ANSWER:
NOTES:
REF:

30

The concept of computer design that allows for future modifications and
42. additions by members of the public is known as which of the following?
a. closed architecture
c. open architecture
b. proprietary architecture
d. licensed architecture
C
ANSWER:
NOTES:
REF:

21

Fiberoptics and wireless technologies have given rise to which of the following
43. terms?

a. WAN
b. Internet

c. WLAN
d. LAN
C

ANSWER:
NOTES:
REF:

31

In 1977, Apple released the ____ based upon the Motorola 6502 processor.
c. Macintosh
44. a. Apple I
b. Apple II
d. iPod
B
ANSWER:
NOTES:
REF:

24

The Macintosh had the first mass-produced ____ , an interface that uses
45. graphical instead of text commands.
a. ARPA
c. GUI
b. SMP
d. MPP
C
ANSWER:
NOTES:
REF:

27

IBMs first multipurpose machine was called which of the following?


c. Mark I
46. a. UNIVAC
b. EDVAC
d. ENIAC
C
ANSWER:
NOTES:
REF:

Assembly language, while easier to use than machine code, has what type of
47. correspondence with machine code?

a. many-to-one
b. many-to-many

c. one-to-one
d. one-to-many

C
ANSWER:
NOTES:
REF:

16

The term ____ computing or ____ architectures refers to linking a number of


48. CPUs to work on a task simultaneously.
a. parallel
c. serial
b. sequential
d. monolithic
A
ANSWER:
NOTES:
REF:

29

A(n) ____ network consists of computers that independently decide how to


49. channel to the next computer.
a. concentrated
c. monolithic
b. distributed
d. centralized
B
ANSWER:
NOTES:
REF:

30

CS-ch-2-PRACTICE
True/False
Indicate whether the sentence or statement is true or false.
There are only four ways to modify or transform a graphic.
1.
F
ANSWER:
NOTES:
REF:

61

Flowcharting is best described as an Internet related task related to surfing.


2.
F
ANSWER:
NOTES:
REF:

48

Because computer scientists focus on program design, there is really no need for
3. them to acquire proficiency in performing Office tasks.
F
ANSWER:
NOTES:
REF:

48

A user-friendly programmers workspace is a high-level analogy for an


4. Integrated Development Environment (IDE).
T
ANSWER:
NOTES:
REF:

66

FTP transmission methods are appropriate for placing files in a common location
5. so that many users can download and have access to them.

T
ANSWER:
NOTES:
REF:

76

There is no universal software tool that can be applied to the entire spectrum of
6. tasks.
T
ANSWER:
NOTES:
REF:

47

Animation and interactivity tend to increase user interest in a Web site.


7.
T
ANSWER:
NOTES:
REF:

80

Given the appropriate tool, nearly any user can generate graphical content.
8.
T
ANSWER:
NOTES:
REF:

59

Microsoft Project software makes the job of project manager obsolete.


9.
F
ANSWER:
NOTES:
REF:

57

Word-processed documents may be input into desktop publishers


10.
T
ANSWER:
NOTES:
REF:

53

pcAnywhere affords remote access to all PCs, whether or not a version of this
11. software is installed in the remote device.
F
ANSWER:
NOTES:
REF:

70

Compression algorithms can be easily converted into computer programs.


12.
F
ANSWER:
NOTES:
REF:

75

Computer scientists rarely use e-mail to share files.


13.
F
ANSWER:
NOTES:
REF:

74

A text editor is just another term for a multifunction word processor.


14.
F
ANSWER:
NOTES:
REF:

51

Computer scientists will never find occasion to use spreadsheet technologies.


15.
F
ANSWER:
NOTES:
REF:

55

Interaction with an FTP Web site is similar to interaction with a network drive.
16.
T
ANSWER:
NOTES:
REF:

77

If a user seeks a document tool with the most extensive formatting and graphics
17. capabilities, he/she is best advised to consider a word processor over a generic
text editor.
T
ANSWER:
NOTES:
REF:

50

As expected, the term freeware implies software available free of charge.


18.
T
ANSWER:
NOTES:
REF:

64

The computer scientists flowchart can be used as a roadmap to describe how a


19. system should be developed.
T
ANSWER:
NOTES:

REF:

65

A word processor is not the tool of choice for memo design and creation.
20.
F
ANSWER:
NOTES:
REF:

49

In the context of databases, a column represents a record of information.


21.
F
ANSWER:
NOTES:
REF:

67

Researching the benefits and features of the various software tools involves a
22. one-time investment of time and energy.
F
ANSWER:
NOTES:
REF:

81

A variety of graphical formats supports the variety of images available on the


23. Internet.
T
ANSWER:
NOTES:
REF:

59

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.

To flip an image upside down, the user would ____ it 180 degrees.
c. crop
24. a. resize
b. rotate
d. scale
B
ANSWER:
NOTES:
REF:

62

Which of the following tools specializes in sophisticated page layout?


c. text editor
25. a. project scheduler
b. desktop publisher
d. spreadsheet
B
ANSWER:
NOTES:
REF:

53

When you are diagramming and creating flowcharts, you are principally engaged
26. in ____ tasks.
a. programming
c. Web
b. office
d. network repair
A
ANSWER:
NOTES:
REF:

48

In addition to redundant areas, ____ compression techniques eliminate


27. information not perceptible to the human eye.
a. lossless
c. lossy
b. primary
d. secondary
C
ANSWER:
NOTES:
REF:

60

The 16.7 million color palette of the BMP format requires ____ bits.
c. 24
28. a. 16
b. 20
d. 32
C
ANSWER:
NOTES:
REF:

59

Data ____can be used to reduce the size of a file and speed the transmission of
29. the file through e-mail.
a. collaboration
c. inlining
b. design
d. compression
D
ANSWER:
NOTES:
REF:

74

____ in the form of logos, cartoons, and maps play a large part in the world of
30. information sharing.
a. Texts
c. Databases
b. Graphics
d. Protocols
B
ANSWER:
NOTES:
REF:

59

Text editors, compilers, and debuggers are directly featured on the menu of
31. which of the following software tools?
a. Integrated Development Environment
b. word processor
c. spreadsheet
d. desktop publisher
A
ANSWER:
NOTES:

REF:

66

File ____ Protocol (or FTP) is a transmission method used to send files across
32. the Internet.
a. Task
c. Transfer
b. Test
d. Table
C
ANSWER:
NOTES:
REF:

76

The ____ extension is one of the more popular compression formats in the world
33. of Windows.
a. .bat
c. .zip
b. .car
d. .exe
C
ANSWER:
NOTES:
REF:

75

A ____ tool is the most logical choice for the development of a slide show.
c. word processing
34. a. spreadsheet
b. presentation
d. scheduling
B
ANSWER:
NOTES:
REF:

54

A grid-like document that facilitates arithmetic manipulation and presentation is


35. called a ____.
a. resume
c. memo
b. fax
d. spreadsheet
D
ANSWER:

NOTES:
REF:

55

A ____ is a generic tool that allows you to do basic editing, although the finished
36. document wont have a professional look.
a. word processor
c. GUI
b. text editor
d. spreadsheet
B
ANSWER:
NOTES:
REF:

51

UML or Universal ____ Language diagrams are used to develop object-oriented


37. systems and programs.
a. Modeling
c. Master
b. Markup
d. Middling
A
ANSWER:
NOTES:
REF:

65

____ is a graphics tool popular with Web designers.


c. Redux
38. a. Tron
b. Macromedia Fireworks
d. Starry Messenger
B
ANSWER:
NOTES:
REF:

64

Creating documents, presentations, and spreadsheets are best classified as ____


39. tasks.
a. programming
c. scientific
b. Internet
d. office

D
ANSWER:
NOTES:
REF:

48

The process of changing image format from one type to another is called ____.
c. blurring
40. a. conversion
b. rotating
d. cropping
A
ANSWER:
NOTES:
REF:

63

Images reduced by ____ compression techniques retain their original quality.


c. sassy
41. a. lackless
b. lossless
d. glossy
B
ANSWER:
NOTES:
REF:

60

A ____ is a collection of information usually organized into tables.


c. database
42. a. browser
b. multiplex
d. publisher
C
ANSWER:
NOTES:
REF:

67

Grammar check and font selection are common features of which of the
43. following tools?
a. browser
c. binder
b. text editor
d. word processor

D
ANSWER:
NOTES:
REF:

50

Which of the following programming environments is actually a platform hosting


44. a number of distinct languages?
a. Borland JBuilder
c. CodeConqueror
b. Microsoft.NET
d. Rhodes
B
ANSWER:
NOTES:
REF:

67

Graphics software available in the form of ____ is generally free of charge


45. during a trial period.
a. adware
c. shareware
b. middleware
d. malware
C
ANSWER:
NOTES:
REF:

64

Which of the following graphical formats should be favored for animation and
46. small file size?
a. BMP
c. JPG
b. GIF
d. TIF
B
ANSWER:
NOTES:
REF:

60

CS 3 practice computer architecture


True/False
Indicate whether the sentence or statement is true or false.
Transistors are simply small electronic switches that can be in either an on or an
1. off state.
T
ANSWER:
NOTES:
REF:

94

A truth table with two inputs would have two rows.


2.
F
ANSWER:
NOTES:
REF:

97

The Boolean OR operator returns a 1 only when either or both of the inputs are 1.
3.
T
ANSWER:
NOTES:
REF:

98

Each gate in a circuit reacts in a completely unpredictable way.


4.
F
ANSWER:
NOTES:
REF:

99

In the adder, the bits are added according to the rules of the hexadecimal
5. numbering system.

F
ANSWER:
NOTES:
REF:

103

The flip-flop circuit latches onto a bit and maintains the output until it is
6. changed.
T
ANSWER:
NOTES:
REF:

105

Control wires contain the binary data that is being read from or written to
7. memory and I/0.
F
ANSWER:
NOTES:
REF:

110

ROM (read-only memory) is not erased when the computer power goes off.
8.
T
ANSWER:
NOTES:
REF:

111

The mouse is considered to be a primary input device.


9.
T
ANSWER:
NOTES:
REF:

116

CRT displays are much thinner and run much cooler than LCD monitors.
10.
F
ANSWER:
NOTES:
REF:

116

Interrupt handling is a much more efficient method for processing I/0 than
11. polling.
T
ANSWER:
NOTES:
REF:

118

A capacitor consists of three parts, an emitter, a collector, and a base.


12.
F
ANSWER:
NOTES:
REF:

95

The AND operator has an output of 1 (true) only if both inputs are 0.
13.
F
ANSWER:
NOTES:
REF:

98

The combination of gates enables the computer to do all the things that it does.
14.
T
ANSWER:
NOTES:
REF:

99

Decoder circuits perform functions such as addressing memory and selecting


15. input or output devices.
T
ANSWER:
NOTES:
REF:

104

The computer has a crystal clock called a(n) control clock that times, or
16. synchronizes, each of the steps in the fetch-execute cycle.
F
ANSWER:
NOTES:
REF:

109

Bus wires in the system category are responsible for timing signals and other
17. protocols.
F
ANSWER:
NOTES:
REF:

110

The most commonly used form of mass storage is the floppy disk drive.
18.
F
ANSWER:
NOTES:
REF:

113

Flash memory is nonvolatile.


19.
T
ANSWER:
NOTES:

REF:

115

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
By switching on and off, the ____ can be used to represent the 1s and 0s that are
20. the foundation of all that goes on in the computer.
a. capacitor
c. resistor
b. transistor
d. inductor
B
ANSWER:
NOTES:
REF:

95

____ algebra is concerned with the logic of the operators AND, OR, and NOT.
c. Boolean
21. a. Linear
b. Modern
d. Fibonacci
C
ANSWER:
NOTES:
REF:

96

The ____ operator works with a single input and its purpose is to reverse the
22. input.
a. XOR
c. AND
b. NOT
d. OR
B
ANSWER:
NOTES:
REF:

98

The AND circuit generates ____ output for each set of inputs.
c. three
23. a. one
b. two
d. four

A
ANSWER:
NOTES:
REF:

100

The truth table for the NOT gate shows that the output is the ____ of the input.
c. opposite
24. a. square
b. first derivative
d. same
C
ANSWER:
NOTES:
REF:

100

The truth table for the ____ gate indicates that the output is 1 only when the
25. inputs are different.
a. OR
c. AND
b. XOR
d. NAND
B
ANSWER:
NOTES:
REF:

102

A gates output for any set of inputs follows the specifications given in the ____
26. table.
a. variable
c. log
b. data
d. truth
D
ANSWER:
NOTES:
REF:

102

One of the main functions of the ____ component of the computers CPU is to
27. add numbers.
a. controller
c. memory
b. ALU
d. register

B
ANSWER:
NOTES:
REF:

103

Which piece of technology replaced the vacuum tube?


c. capacitor
28. a. transistor
b. diode
d. resistor
A
ANSWER:
NOTES:
REF:

107

Very Large-Scale Integration (VLSI) chips hold ____ of circuits.


c. millions
29. a. hundreds
b. thousands
d. trillions
C
ANSWER:
NOTES:
REF:

107

Most computers today are still based on what has come to be called ____
30. architecture, and are sometimes still called ____ machines.
a. Hilbert
c. Von Neumann
b. Turing
d. Non Von
C
ANSWER:
NOTES:
REF:

108

At a basic level, most computers operate on what is called a(n) ____ cycle.
c. store-revise
31. a. encrypt-encapsulate
b. edit-add
d. fetch-execute

D
ANSWER:
NOTES:
REF:

109

RAM is called ____ because it does not have to be read sequentially.


c. remedial
32. a. relative
b. random
d. rapid
B
ANSWER:
NOTES:
REF:

111

Which of the following storage forms is non-volatile?


c. DDRAM
33. a. DRAM
b. SRAM
d. CD-ROM
D
ANSWER:
NOTES:
REF:

111-112

Hard disks are made up of one or more metal platters with a coating consisting of
34. ____ particles.
a. magnetic
c. photonic
b. atomic
d. silicon
A
ANSWER:
NOTES:
REF:

113

Keyboards, and most other I/O devices, connect to the motherboard through a(n)
35. ____.
a. socket
c. channel
b. adapter
d. port

D
ANSWER:
NOTES:
REF:

115

The process of painting an image on the screen of a monitor is called ____


36. scanning.
a. raster
c. cathode
b. roster
d. dpi
A
ANSWER:
NOTES:
REF:

116

Printers are rated by both printing speed.and ____ of output.


c. size
37. a. definition
b. variety
d. resolution
D
ANSWER:
NOTES:
REF:

117

When an I/O device places a voltage signal on a(n) ____ line, the associated chip
38. checks its priority before passing it on to the CPU.
a. poll
c. interrupt
b. job
d. JCL
C
ANSWER:
NOTES:
REF:

118

True/False
Indicate whether the statement is true or false.
__F_ 26. Every computer game, program, picture, or sound is stored in the computer as a series of decimal
digits.
__T_ 27. Negative powers are used to represent the fractional portion of numbers.
__F_ 28. The hexadecimal numbering system has seventeen unique digits.
_T__ 29. The hexadecimal number system uses letters to represent digits beyond nine.
_F__ 30. The term radix is synonymous with positional value.
____ 31. For any quantity, there is a number in any base to represent it.
__T__ 32. Table look-ups can be used to convert a number from one base to another.
__F__ 33. The decimal equivalent of 111112 is 31000.
__T__ 34. The conversion algorithm from base 10 to another base utilizes a sequence of remainders to
construct the new number.
__T__ 35. The difference between adding numbers in base 10 and any other base lies in the carry process.
__F__ 36. Modern computers are capable of storing hexadecimal information.
__T__ 37. Half of a byte is sometimes referred to as a nibble.
__T__ 38. Hexadecimal numbers are used as a shorthand method to represent binary values.
__F__ 39. Whole numbers or integers are internally represented by the computer as hexadecimal numbers.
__F__ 40. Signed and unsigned numbers in the computer are designed to always take up a different number
of bits.
__F__ 41. Negative fractional numbers cannot be internally represented in a computer.
__T__ 42. The Unicode character standard is compatible with the extended ASCII standard.
__T__ 43. The number of pixels in each row and column defines the resolution of a display.
__F__ 44. The Unicode method of character representation is fast becoming obsolete.
__F__ 45. In the common monitor resolution specified as 1024 X 768, the number 1024 represents rows and
768 represents dots (or pixels).
__F__ 46. As the resolution numbers get larger for a monitor, the size of each pixel gets larger.
__T__ 47. Sounds are stored in the computer in a manner very similar to images.
__F__ 48. The number of words used for each sound sample determines how many unique amplitude levels
can be represented.
__T__ 49. Raw audio samples are stored in files such as WAV files.
__F__ 50. It is not possible to learn to program or to manage a database without understanding binary and
hexadecimal number systems.
Multiple Choice

Identify the choice that best completes the statement or answers the question.
____ 76. Displays containing the contents of a computers memory or the hard disk are often referred to as
____ memory dumps.
a. error
c. decimal
b. hexadecimal
d. octal
-4
____ 77. The number 10 evaluates to which of the following?
a. 0.000001
c. 0.0001
b. 0.00001
d. 10000
____ 78. A ____ is identified by the number of digits a numbering system has, including zero.
a. root
c. determinant
b. discriminant
d. base
____ 79. The concept of ____ value is common to all modern numbering systems.
a. positional
c. deterministic
b. radical
d. random
____ 80. According to positional value, the binary number 101012 represents ____ things.
a. 3
c. 12
b. 5
d. 21
____ 81. The hexadecimal numbering system runs out of digits after ____.
a. E
c. G
b. F
d. H
____ 82. The decimal equivalent of 10016 is ____.
a. 116
c. 256
b. 160
d. 1600
____ 83. What is the result of converting the decimal number 25 to a base 16 equivalent?
a. F
c. 1A
b. 19
d. 31
____ 84. What is the result of converting the decimal number 25 to a base 2 equivalent?
a. 100012
c. 110012
b. 100112
d. 111012
____ 85. What binary number results from adding 1112 and 1112?
a. 10002
c. 11102
b. 10112
d. 11112
____ 86. A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off).
a. nibble
c. byte
b. word
d. bit
____ 87. A ____ is a group of eight bits.
a. byte
c. nibble
b. word
d. blip
____ 88. An 8-nibble word is more likely to be referred to as the equivalent ____-byte word.
a. 2
c. 8
b. 4
d. 16
____ 89. Each hexadecimal digit relates directly to a ____-bit binary pattern.
a. 2
c. 8
b. 4
d. 16
____ 90. Which of the following methods represents the most common way of storing signed numbers?
a. ones complement
c. integer complement
b. binary complement
d. twos complement
____ 91. To find the ____ of a given bit, flip it to the opposite state.

____ 92.

____ 93.

____ 94.

____ 95.

____ 96.

____ 97.

____ 98.

____ 99.

____ 100.

a. root
c. position
b. complement
d. sign
In scientific notation, the method of displaying numbers uses a(n) ____ and an exponent.
a. mantissa
c. abscissa
b. asymptote
d. ordinate
The eight bit extended ASCII (American Standard Code for Information Interchange) character
set can be used to represent ____ characters.
a. 128
c. 512
b. 256
d. 34,168
A ____ is the smallest unit that can be displayed on a computer monitor.
a. micron
c. twip
b. picon
d. pixel
____ patterns contain information about the color and brightness of a pixel.
a. Binary
c. Decimal
b. Octal
d. Hexadecimal
Unicode character representation uses a(n) ____ bit standard.
a. 4
c. 8
b. 7
d. 16
Various ____ techniques have been designed to allow the same image information to be stored in
a smaller file.
a. consolidation
c. scanning
b. compression
d. resolution
A sound consists of a waveform that has amplitude (volume) and a ____ (pitch).
a. frequency
c. phase angle
b. phase shift
d. period
The computer samples sound at fixed intervals and each sample is assigned a binary value
according to its ____.
a. frequency
c. amplitude
b. period
d. pitch
Which of the following is an example of a video compression format?
a. BMP
c. MPEG
b. GIF
d. TIF

ch5practice
True/False
Indicate whether the sentence or statement is true or false.
The MCP is the software control center of the modern computer.
1.
F
ANSWER:
NOTES:
REF:

157

When power is turned on, the CPU begins executing the instructions located in
2. the CMOS chip.
F
ANSWER:
NOTES:
REF:

159

An OS can reside on a ROM chip.


3.
T
ANSWER:
NOTES:
REF:

160

Applications cannot be designed to run on multiple platforms.


4.
F
ANSWER:
NOTES:
REF:

162

Every multipurpose device with a CPU must also have an operating system.
5.

T
ANSWER:
NOTES:
REF:

163

The Windows operating system no longer provides a command-line interface.


6.
F
ANSWER:
NOTES:
REF:

165

The processes that are running under Windows may be viewed by pressing the
7. Ctrl+Alt+Del key combination.
T
ANSWER:
NOTES:
REF:

165

The Von Neumann architecture supports the parallel execution of instructions.


8.
F
ANSWER:
NOTES:
REF:

166

The parts of a computer system, such as the CPU, memory, keyboard, monitor,
9. and network adapter, all function at different speeds.
T
ANSWER:
NOTES:
REF:

166

It is not theoretically possible for each of the programs or processes running on a


10. computer to directly access I/O devices.
F
ANSWER:
NOTES:
REF:

168

Plug and Play technologies automatically detect and configure I/O devices.
11.
T
ANSWER:
NOTES:
REF:

168

Deadlock issues are resolved without the intervention of the operating system.
12.
F
ANSWER:
NOTES:
REF:

168

Operating systems are responsible for the protection of memory and other
13. resources.
T
ANSWER:
NOTES:
REF:

169

Files may be viewed as leaves or nodes on a tree-like structure.


14.
T
ANSWER:
NOTES:
REF:

170

UNIX and DOS natively use a graphical user interface.


15.
F
ANSWER:
NOTES:
REF:

171

DISPLAY is a DOS command that lists the files in a specified directory or


16. subdirectory.
F
ANSWER:
NOTES:
REF:

172

Windows and DOS use the FDISK command to partition the drives.
17.
T
ANSWER:
NOTES:
REF:

172

Formatting can be used to create boot disks.


18.
T
ANSWER:
NOTES:
REF:

173

Folders may not contain folders.


19.
F
ANSWER:
NOTES:
REF:

175

The parent-child structure has nearly unlimited logical depth.


20.
T
ANSWER:
NOTES:
REF:

175

DOS has a limitation of 255 characters for the name of a folder.


21.
F
ANSWER:
NOTES:
REF:

175

DOS and UNIX allow for recovery of folders and files after they have been
22. deleted.
F
ANSWER:
NOTES:
REF:

179

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Interface programs that allow a computer to interact with peripheral devices are
23. called ____.
a. shell scripts
c. drivers
b. applets
d. monitors
C
ANSWER:
NOTES:
REF:

158

The ____ is the core of the OS.


24. a. file manager
b. scheduler

c. GUI
d. kernel

D
ANSWER:
NOTES:
REF:

159

The operating system running on a computer is often called its ____ and is
25. typically tied to a particular CPU.
a. support
c. intermediary
b. platform
d. driver
B
ANSWER:
NOTES:
REF:

162

Which of the following terms refers to computing with more than one CPU?
c. multileveraging
26. a. multitasking
b. multilayering
d. multiprocessing
D
ANSWER:
NOTES:
REF:

163

Which of the following operating systems supports multitasking?


c. MS-DOS
27. a. Windows XP
b. CP/M
d. Apple II
A
ANSWER:
NOTES:
REF:

163

Which of the following is a primary function of an operating system?


c. generating flowcharts
28. a. managing resources
b. generating documents
d. solving differential equations
A
ANSWER:
NOTES:
REF:

163

Console operating systems prompt users to interact through a(n) ____ line.
c. programming
29. a. operational
b. flow
d. command
D
ANSWER:
NOTES:
REF:

164

A program that is currently executing is called a ____.


c. JCL
30. a. code segment
b. process
d. regular routine
B
ANSWER:
NOTES:
REF:

165

Which of the following operating systems was designed to accommodate


31. multiple users and multiple tasks?
a. DOS
c. UNIX
b. CP/M
d. Windows 3.0
C
ANSWER:
NOTES:
REF:

166

Time-____ is a method that allows multiple processes to share the CPU.


c. solving
32. a. switching
b. sourcing
d. slicing
D
ANSWER:
NOTES:
REF:

167

The operating system reallocates the CPU through a program known as a(n) ____
33. handler.
a. interrupt
c. control
b. job
d. disruption
A
ANSWER:
NOTES:
REF:

167

A situation known as ____ occurs when all active processes are tied up in a
34. circular wait for resources.
a. synchronization
c. safe mode
b. context switch
d. deadlock
D
ANSWER:
NOTES:
REF:

168

____ are simply broad divisions of the total capacity of the disk into specific OS
35. areas.
a. Segments
c. Categories
b. Portions
d. Partitions
D
ANSWER:
NOTES:
REF:

172

In Unix or Linux, entering ____<command> gives you the manual on the


36. command that you specify.
a. MAN
c. HELP
b. man
d. help
B
ANSWER:
NOTES:
REF:

172

In DOS, you can enter ____ <command> to get more details concerning a
37. particular command.
a. HELP
c. ASSIST
b. AID
d. SUPPORT
A
ANSWER:
NOTES:
REF:

172

The process of ____ arranges the disk surface into addressable areas and sets up
38. the basic directory tree structure on the disk.
a. organizing
c. templating
b. formatting
d. shaping
B
ANSWER:
NOTES:
REF:

173

The main directory level is also called the ____ level.


c. leaf
39. a. root
b. child
d. primary
A
ANSWER:
NOTES:

REF:

175

In Windows, deleted files and folders reside in the ____ Bin folder until it is
40. emptied.
a. Remainder
c. Recycle
b. Refuse
d. Recovery
C
ANSWER:
NOTES:
REF:

179

____ are characters that are used to match any character at the end of a file name
41. to a particular file extension.
a. Deuces
c. Aces
b. Jokers
d. Wildcards
D
ANSWER:
NOTES:
REF:

179

Moving files is similar to ____ files.


c. copying
42. a. deleting
b. closing
d. opening
C
ANSWER:
NOTES:
REF:

183

Wildcard specifications are case sensitive in ____.


c. Windows XP
43. a. UNIX
b. DOS
d. MAC OS
A
ANSWER:
NOTES:

REF:

179

Which of the following commands enables UNIX to partition a disk drive?


c. pdisk
44. a. FDISK
b. PDISK
d. fdisk
D
ANSWER:
NOTES:
REF:

172

cs6PRACTICE
True/False
Indicate whether the sentence or statement is true or false.
The most popular transmission medium has been silicon.
1.
F
ANSWER:
NOTES:
REF:

196

Wireless networking uses the same technology as the radio in your car and the
2. cell phone in your pocket.
T
ANSWER:
NOTES:
REF:

201

Without protocols, computers would not function.


3.
T
ANSWER:
NOTES:
REF:

204

Fiber-optic cables are much more susceptible to attenuation than copper cables.
4.
F
ANSWER:
NOTES:
REF:

199

Each physical device connected to a network must have a network interface card
5. (NIC).

T
ANSWER:
NOTES:
REF:

211

Repeaters alter the content of the data in the signals that they boost.
6.
F
ANSWER:
NOTES:
REF:

211

The TCP/IP protocol lies at the heart of the Internet.


7.
T
ANSWER:
NOTES:
REF:

195

The Data Link layer of the OSI model uses routing protocols to select optimal
8. paths between two end systems.
F
ANSWER:
NOTES:
REF:

205

You can compress information by replacing repeating patterns with a code.


9.
T
ANSWER:
NOTES:
REF:

214

Unguided media cannot transmit or carry electromagnetic signals.


10.

F
ANSWER:
NOTES:
REF:

197

The signal to noise ratio measures the quality of a communications channel.


11.
T
ANSWER:
NOTES:
REF:

196

Fast Ethernet speeds do not exceed 10 Mbps.


12.
F
ANSWER:
NOTES:
REF:

210

Shifting the starting point of an audio waveform is known as frequency


13. modulation.
F
ANSWER:
NOTES:
REF:

213

Unlike repeaters and hubs, bridges have intelligence.


14.
T
ANSWER:
NOTES:
REF:

212

The bit error rate usually increases as the transfer rate decreases.
15.

F
ANSWER:
NOTES:
REF:

196

The normal copper wire that comes into your home is capable of speeds up to 1.5
16. Mbps.
T
ANSWER:
NOTES:
REF:

215

Layers in the OSI model are designed independently of the others.


17.
T
ANSWER:
NOTES:
REF:

207

Impedance makes the electrical signals weaken as they travel along the wire.
18.
T
ANSWER:
NOTES:
REF:

198

The computers attached to a network are often referred to as nodes.


19.
T
ANSWER:
NOTES:
REF:

208

The distinction between LANs and WANs is clear and well defined.
20.

F
ANSWER:
NOTES:
REF:

207

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
The Transport layer of the OSI model uses data units called _____.
c. bitgrams
21. a. words
b. datagrams
d. bytegrams
B
ANSWER:
NOTES:
REF:

205

_____ pulses allow transmission rates up to 4 Mbps.


c. X-ray
22. a. Microwave
b. Infrared
d. Ultraviolet
B
ANSWER:
NOTES:
REF:

202

The tendency of a signal to become weaker over distance is known as _____.


c. attenuation
23. a. amplification
b. alienation
d. amelioration
C
ANSWER:
NOTES:
REF:

196

The _____ layer of the OSI model is responsible for translation, formatting, and
24. syntax selection.

a. Presentation
b. Session

c. Application
d. Data Link

A
ANSWER:
NOTES:
REF:

205

Fiber-optic cables use _____ fibers to guide light pulses along a cable.
c. plastic
25. a. ceramic
b. glass
d. tungsten
B
ANSWER:
NOTES:
REF:

199

Cable is theoretically capable of speeds up to _____.


c. 420 Mbps
26. a. 4.2 Mbps
b. 42 Mbps
d. 42 Gbps
B
ANSWER:
NOTES:
REF:

217

_____ direct network traffic based on the logical (IP) addresses assigned at the
27. third layer of the OSI stack.
a. Bridges
c. Hubs
b. Routers
d. Gateways
B
ANSWER:
NOTES:
REF:

212

A _____ is a device designed to protect an internal network or node from


28. intentional or unintentional damage from an external network.

a. gate
b. barricade

c. firewall
d. fence

C
ANSWER:
NOTES:
REF:

212

_____ media are physical media such as copper wire or fiber-optic cable.
c. Undirected
29. a. Directed
b. Guided
d. Oriented
B
ANSWER:
NOTES:
REF:

197

In a _____ topology, one of the computers or a network device serves as a hub


30. for all messages.
a. grid
c. bus
b. star
d. ring
B
ANSWER:
NOTES:
REF:

209

A(n) _____ diagram shows the protocol interactions between two entities.
c. timing
31. a. flow
b. assignment
d. hierarchy
C
ANSWER:
NOTES:
REF:

203

Twisting copper wires nearly eliminates the electromagnetic effect known as


32. _____.

a. inductance
b. resistance

c. resonance
d. impedance

A
ANSWER:
NOTES:
REF:

198

Which of the following WAN technologies use the same unguided media as
33. television?
a. DSL
c. cable
b. dial-up
d. satellite
D
ANSWER:
NOTES:
REF:

217

A(n) _____ is a set of rules designed to facilitate communication.


c. code
34. a. procedure
b. accord
d. protocol
D
ANSWER:
NOTES:
REF:

202

The PCI system bus consists of _____ wires.


c. 98
35. a. 10
b. 20
d. 198
C
ANSWER:
NOTES:
REF:

195

_____ measures the speed a transmission medium is able to handle in bits per
36. second.

a. Bandwidth
b. Byte capacity

c. Bit capacity
d. Broadwidth

A
ANSWER:
NOTES:
REF:

196

Normal telephone voice-grade lines use what is called _____-division


37. multiplexing to divide up the bandwidth among the subscribers.
a. phase
c. wave
b. frequency
d. amplitude
B
ANSWER:
NOTES:
REF:

216

The OSI conceptual model for the communication process has _____ discrete
38. layers.
a. four
c. seven
b. five
d. nine
C
ANSWER:
NOTES:
REF:

205

A _____ is a relatively small number of computers connected together in close


39. proximity, usually within a building or complex.
a. LAN
c. DAN
b. WAN
d. MAN
A
ANSWER:
NOTES:
REF:

207

The normal copper wire is capable of carrying _____ voice channels.


c. 24
40. a. 4
b. 16
d. 48
C
ANSWER:
NOTES:
REF:

215

CS CH 7 the internet practice test


True/False
Indicate whether the sentence or statement is true or false.
Computers and the Internet are changing the face of nearly every industry.
1.
T
ANSWER:
NOTES:
REF:

229

You can directly connect to a National Backbone Provider from your home
2. computer.
F
ANSWER:
NOTES:
REF:

230

SMTP and FTP are two protocols involved with the Internet.
3.
T
ANSWER:
NOTES:
REF:

231

The TCP protocol has provisions for addressing the packets to ensure that they
4. get to the correct place.
F
ANSWER:
NOTES:
REF:

232

The middle part of the IP address identifies the host on the network.
5.

T
ANSWER:
NOTES:
REF:

234

Routers work in a manner similar to the way mail is delivered.


6.
T
ANSWER:
NOTES:
REF:

236

Routers check that the data received in the packet is identical to the data that was
7. sent.
F
ANSWER:
NOTES:
REF:

237

High-level protocols such as HTTP and FTP can only be used in the Internet
8. environment.
F
ANSWER:
NOTES:
REF:

239

The Telnet protocol runs above the TCP/IP layer.


9.
T
ANSWER:
NOTES:
REF:

240

FTP is the protocol that allows Web browsers and Web servers to talk to each
10. other.
F
ANSWER:
NOTES:
REF:

241

A URL consists of the domain name followed by specific folder and/or


11. filenames.
T
ANSWER:
NOTES:
REF:

241

There is a top-level DNS server for each of the top-level domains.


12.
T
ANSWER:
NOTES:
REF:

242

The standard port number for HTTP is 21, and for FTP it is 80.
13.
F
ANSWER:
NOTES:
REF:

243

The 192.168 subnet is never presented to the outside Internet.


14.
T
ANSWER:
NOTES:
REF:

244

Web page design tools such as Microsoft Front Page or Macromedia


15. Dreamweaver have made HTML obsolete.
F
ANSWER:
NOTES:
REF:

248

HTML is not case sensitive.


16.
T
ANSWER:
NOTES:
REF:

250

Normally, HTML pages are dynamic; they change from one request to another.
17.
F
ANSWER:
NOTES:
REF:

250

HTML deals with both the form and content of a Web page.
18.
F
ANSWER:
NOTES:
REF:

252

A Web service is a server-based Web program that contains data to be used by


19. other programs or Web pages.
T
ANSWER:
NOTES:

REF:

252

Search engines use one main method to build a database of Web sites.
20.
F
ANSWER:
NOTES:
REF:

255

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Your Internet provider maintains a switching center called a _____.
c. cusp
21. a. nexus
b. point-of-presence
d. receive-and-send
B
ANSWER:
NOTES:
REF:

230

The acronym HTTP stands for _____.


c. Hypertext Transfer Protocol
22. a. Heuristic Transport Type
Protocol
b. Hexadecimal Task Test
d. Hypertext Transition Protocol
Protocol
C
ANSWER:
NOTES:
REF:

231

The _____ protocol establishes a virtual circuit with the destination computer to
23. transmit packets.
a. TCP
c. HTTP
b. IP
d. FTP

A
ANSWER:
NOTES:
REF:

232

Central to the operation of the IP protocol is the IP _____ of both the source and
24. destination.
a. name
c. signifier
b. location
d. address
D
ANSWER:
NOTES:
REF:

233

The total pool of IPv4 addresses is separated into groups, called _____.
c. aggregations
25. a. classes
b. entities
d. clusters
A
ANSWER:
NOTES:
REF:

234

Subnets are defined through the use of a subnet _____.


c. sentinel
26. a. filter
b. screen
d. mask
D
ANSWER:
NOTES:
REF:

235

Using _____, a packet can just be sent on an alternate line if the desired line is
27. damaged or busy.
a. hubs
c. switches
b. routers
d. linkers

B
ANSWER:
NOTES:
REF:

236

So that packets do not keep bouncing from router to router forever, one of the
28. fields in the IP header is the _____ field.
a. time to live
c. lifetime
b. time to expire
d. expiration
A
ANSWER:
NOTES:
REF:

237

TCP and IP protocols map to Transport, Network, and _____ layers of the OSI
29. model.
a. Presentation
c. Data Link
b. Application
d. Session
D
ANSWER:
NOTES:
REF:

238

The _____ protocol establishes a link from an e-mail client to a mail server.
c. IMAP
30. a. SMTP
b. POP3
d. HTTP
A
ANSWER:
NOTES:
REF:

239

The _____ protocol is used to provide the reliable and efficient transmission of
31. data files.
a. UDP
c. FTP
b. TCP
d. IP

C
ANSWER:
NOTES:
REF:

239

Which of the following computer scientists invented the World Wide Web?
c. Marc Andreesen
32. a. E.F. Codd
b. Tim Berners-Lee
d. Donald Knuth
B
ANSWER:
NOTES:
REF:

241

The problem of having to remember IP addresses was solved by allowing Web


33. servers to have _____ names.
a. range
c. resource
b. locator
d. domain
D
ANSWER:
NOTES:
REF:

241

When you type in a URL in the address bar of your browser, you send a _____
34. lookup request to the _____ server at your ISP.
a. POP
c. SND
b. DNS
d. NET
B
ANSWER:
NOTES:
REF:

243

The port number can be analogized to which of the following address


35. components?
a. street address
c. zip code

b. city

d. apartment number
D

ANSWER:
NOTES:
REF:

243

With _____, multiple computers can share one Internet connection.


c. TCP/IP
36. a. NAT
b. DHCP
d. UDP
A
ANSWER:
NOTES:
REF:

244

You can check the network configuration of your computer in Windows by using
37. the _____ command.
a. IPSETUP
c. NETWORK
b. IPCONFIG
d. NETDESIGN
B
ANSWER:
NOTES:
REF:

245

The _____ server is just a computer that is programmed to respond to HTTP


38. requests.
a. Network
c. Internet
b. Protocol
d. Web
D
ANSWER:
NOTES:
REF:

246

HTML and the Web connect one page to another through _____.
c. hyperlinks
39. a. overlinks

b. higherjoins

d. cyberbridges

C
ANSWER:
NOTES:
REF:

250

_____ languages allow a Web page developer to include dynamic properties.


c. Presentation
40. a. Scripting
b. Hosting
d. Staging
A
ANSWER:
NOTES:
REF:

251

_____ formats content for display in a browser and transfers information via the
41. Web.
a. SGML
c. HTML
b. XML
d. PHP
B
ANSWER:
NOTES:
REF:

253

Crawling makes use of a special program called a bot or _____.


c. spider
42. a. bug
b. butterfly
d. centipede
C
ANSWER:
NOTES:
REF:

255

CS CH 8 database fundamentals PRACTICE


True/False
Indicate whether the sentence or statement is true or false.
Without a database most applications would be useless.
1.
T
ANSWER:
NOTES:
REF:

267

A DBMS delegates the task of ensuring data integrity to the operating system.
2.
F
ANSWER:
NOTES:
REF:

271

An attribute is also called a relation.


3.
F
ANSWER:
NOTES:
REF:

271

A collection of columns referring to one item is called a row or tuple.


4.
T
ANSWER:
NOTES:
REF:

272

Indexes do not require additional storage space in the database.


5.
F
ANSWER:

NOTES:
REF:

273

The information kept in a database is kept in natural or sequential order.


6.
T
ANSWER:
NOTES:
REF:

274

From a database point of view, first normal form is better than second normal
7. form.
F
ANSWER:
NOTES:
REF:

276

It is possible, but generally not desirable, to define a database using


8. unnormalized tables.
T
ANSWER:
NOTES:
REF:

279

The concept of functional dependency includes the determinant and related


9. columns.
T
ANSWER:
NOTES:
REF:

281

The third normal form creates columns that are independent of the primary key.
10.

F
ANSWER:
NOTES:
REF:

283

Once a table is in the second normal form, it has for the most part been
11. accurately defined.
F
ANSWER:
NOTES:
REF:

286

The one-to-many entity relationship is the most common.


12.
T
ANSWER:
NOTES:
REF:

288

One-to-one relationships are never appropriate.


13.
F
ANSWER:
NOTES:
REF:

289

UNIX commands can be used to manipulate data structures within a database.


14.
F
ANSWER:
NOTES:
REF:

291

There are many SQL dialects.


15.

T
ANSWER:
NOTES:
REF:

291

SQL sends only the data you want to view.


16.
T
ANSWER:
NOTES:
REF:

291

SQL commands may not be lowercase.


17.
F
ANSWER:
NOTES:
REF:

293

The order of the fields does not have to match that of the defined table structure.
18.
T
ANSWER:
NOTES:
REF:

297

SQL syntax requires the WHERE clause to precede the keyword FROM.
19.
F
ANSWER:
NOTES:
REF:

296-297

In relation to refining searches, the keyword AND indicates that all criteria must
20. be met.

T
ANSWER:
NOTES:
REF:

298

By default, the SELECT statement returns data in no particular order.


21.
F
ANSWER:
NOTES:
REF:

299

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Data that has been organized and logically related to allow access, retrieval, and
22. use of that data is called a _____.
a. store
c. field
b. database
d. record
B
ANSWER:
NOTES:
REF:

267

A special language known as _____ is used to query or extract information from


23. databases.
a. Selection Quotation Language c. Structured Query Language
b. Sorting Questions Language d. Software Questioning
Language
C
ANSWER:
NOTES:
REF:

269

Which of the following computer scientists made significant contributions to


24. relational database management?
a. Grace Hopper
c. Alan Turing
b. E.F. Codd
d. John Von Neumann
B
ANSWER:
NOTES:
REF:

269

A DBMS must provide or interface with a(n) _____ language to extract


25. information from the database.
a. assembly
c. machine
b. query
d. natural
B
ANSWER:
NOTES:
REF:

271

A _____ or entity is divided into rows or columns much like a spreadsheet.


c. chart
26. a. box
b. grid
d. table
D
ANSWER:
NOTES:
REF:

271

The set of possible values for each column is called the _____ of that column.
c. image
27. a. domain
b. range
d. codomain
A
ANSWER:
NOTES:
REF:

272

A(n) _____ is a special type of file that occupies its own space and specifies one
28. or more columns that determine how the information stored in a table is
organized.
a. field
c. tab
b. identifier
d. index
D
ANSWER:
NOTES:
REF:

273

When the columns are used to determine the sort order of information they are
29. called _____.
a. markers
c. flags
b. keys
d. tokens
B
ANSWER:
NOTES:
REF:

274

The set of rules that dictates how databases are designed is called _____.
c. customization
30. a. normalization
b. standardization
d. invocation
A
ANSWER:
NOTES:
REF:

276

To put the table into the _____ normal form, a separate row needs to be created
31. for each row-column intersection with more than one value.
a. first
c. third
b. second
d. fourth
A
ANSWER:
NOTES:

REF:

279

A key that is made up of more than one column is called which of the following?
c. aggregate
32. a. joined
b. union
d. composite
D
ANSWER:
NOTES:
REF:

281

A(n) _____ dependency exists when one column is dependent upon another
33. column that is not the primary key.
a. transitive
c. relational
b. dysfunctional
d. associative
A
ANSWER:
NOTES:
REF:

283

A(n) _____ defines how one entity works with or relates to another.
c. relationship
34. a. connection
b. arrangement
d. union
C
ANSWER:
NOTES:
REF:

287

A(n) _____ key is defined as a column in one table that is part of the primary key
35. in another.
a. composite
c. auxiliary
b. secondary
d. foreign
D
ANSWER:
NOTES:

REF:

287

_____ shows the numeric occurrences between entities in an ER model.


c. Transitivity
36. a. Functionality
b. Cardinality
d. Dependency
B
ANSWER:
NOTES:
REF:

289

Which of following is a valid SQL command for constructing a table?


c. MAKE TABLE
37. a. BUILD TABLE
b. SETUP TABLE
d. CREATE TABLE
D
ANSWER:
NOTES:
REF:

292

Which of the following SQL key words indicates that data is not required for a
38. specified column?
a. NULL
c. NOT
b. NOTHING
d. VOID
A
ANSWER:
NOTES:
REF:

293

SQL statements are closed with a(n) _____.


c. period
39. a. colon
b. semicolon
d. exclamation mark
B
ANSWER:
NOTES:

REF:

293

Which of the following commands can be used to add new rows of data to a
40. table?
a. INCREASE
c. INSERT
b. ADD
d. INCLUDE
C
ANSWER:
NOTES:
REF:

294

Which of the following SQL statements is most commonly used?


c. DELETE
41. a. INSERT
b. CREATE
d. SELECT
D
ANSWER:
NOTES:
REF:

296

Which of the following is a valid SQL word used to return data in descending
42. order?
a. BOTTOM
c. DESC
b. OPP
d. REV
C
ANSWER:
NOTES:
REF:

302

CS CH 9 Data structures PRACTICE


True/False
Indicate whether the sentence or statement is true or false.
Data structures organize the data in a computer.
1.

T
ANSWER:
NOTES:
REF:

313

The memory cells of an array may store different types of data.


2.
F
ANSWER:
NOTES:
REF:

314

An element is another name for a memory cell in an array.


3.
T
ANSWER:
NOTES:
REF:

316

The first address or position in an array starts with the number one (1).
4.
F
ANSWER:
NOTES:
REF:

317

The upper bound of an array initialized to a size of five (5) is position number
5. four (4).
T
ANSWER:
NOTES:
REF:

318

The statement anArray [2] = 5; assigns the number five (5) to the third
6. component of anArray.

T
ANSWER:
NOTES:
REF:

318

A multi-dimensional array consists of two or more single-dimensional arrays.


7.
T
ANSWER:
NOTES:
REF:

319

A linked list stores data contiguously.


8.
F
ANSWER:
NOTES:
REF:

324

Head pointers are data types associated with static arrays.


9.
F
ANSWER:
NOTES:
REF:

326

A stack is a special form of a list that allows operations such as push and
10. pop.
T
ANSWER:
NOTES:
REF:

328

A stack is a last in, first out (LIFO) data structure.


11.
T
ANSWER:
NOTES:
REF:

329

Stacks, like linked lists and arrays, are just memory locations organized into
12. process friendly structures.
T
ANSWER:
NOTES:
REF:

330

A queue is another type of linked list that implements a LIFO storage system.
13.
F
ANSWER:
NOTES:
REF:

331

Insertions are made at the front of the queue.


14.
F
ANSWER:
NOTES:
REF:

331

Stacks are typically used to organize requests to print documents.


15.
F
ANSWER:
NOTES:
REF:

331

Each position in the tree is called a node or vertex.


16.
T
ANSWER:
NOTES:
REF:

333

In a binary tree, the left node always has a value greater than the right node.
17.
F
ANSWER:
NOTES:
REF:

336

The selection sort is highly efficient for large lists.


18.
F
ANSWER:
NOTES:
REF:

340

The bubble sort is highly inefficient in terms of processing speed.


19.
T
ANSWER:
NOTES:
REF:

344

The shell sort incorporates a bubble sort to organize data.


20.
F
ANSWER:
NOTES:
REF:

345

The insertion sort is modeled after the manual process of sorting cards.
21.
T
ANSWER:
NOTES:
REF:

345

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Which of the following can be classified as a data structure?
c. character
22. a. integer
b. array
d. float
B
ANSWER:
NOTES:
REF:

313

In the context of the Java programming language, the _____ keyword tells the
23. computer that a new array is being created.
a. invoke
c. new
b. allocate
d. make
C
ANSWER:
NOTES:
REF:

315

What type of data can be stored in an array generated by the statement, int[ ]
24. aGrades = new int [5]?
a. strings
c. floats
b. doubles
d. integers
D
ANSWER:
NOTES:

REF:

315

With arrays, the _____ is used to specify the distance between memory locations.
c. length
25. a. offset
b. width
d. address
A
ANSWER:
NOTES:
REF:

317

The index or _____ tells the computer which memory cell to access in the array.
c. pointer
26. a. superscript
b. subscript
d. arrow
B
ANSWER:
NOTES:
REF:

318

Which of the following data structures adapts least efficiently to dynamic


27. memory allocation.
a. linked lists
c. stacks
b. queues
d. arrays
D
ANSWER:
NOTES:
REF:

324

A(n) _____ is a memory cell that contains the address of another memory cell as
28. its data.
a. index
c. pointer
b. token
d. element
C
ANSWER:
NOTES:

REF:

325

Backtracking is most efficiently accomplished by using a(n) _____.


c. tree
29. a. stack
b. queue
d. array
A
ANSWER:
NOTES:
REF:

330

A stack _____ keeps track of the top of a stack.


c. marker
30. a. sentinel
b. flag
d. pointer
D
ANSWER:
NOTES:
REF:

330

Which of the following operations removes an item from a stack?


c. delete
31. a. pop
b. remove
d. eject
A
ANSWER:
NOTES:
REF:

331

Which of the following data structures uses a tail pointer?


c. array
32. a. stack
b. queue
d. binary tree
B
ANSWER:
NOTES:
REF:

331

In order to remove an item from a queue, you would use a _____ operation.
c. requeue
33. a. enqueue
b. dequeue
d. delete
B
ANSWER:
NOTES:
REF:

331

A _____ represents a hierarchical structure similar to that of organizational or


34. genealogy charts.
a. grid
c. digraph
b. network
d. tree
D
ANSWER:
NOTES:
REF:

333

The node that begins the tree is called the _____.


c. root
35. a. branch
b. child
d. leaf
C
ANSWER:
NOTES:
REF:

334

A binary search tree contains _____ components.


c. four
36. a. two
b. three
d. eight
B
ANSWER:
NOTES:
REF:

335

In order to sort data you first need to create a(n) _____ that defines the process
37. for sorting.
a. list
c. stack
b. queue
d. algorithm
D
ANSWER:
NOTES:
REF:

339

The _____ sort starts at the first value in the list and then processes each element
38. looking for the smallest value.
a. merge
c. selection
b. counting
d. radix
C
ANSWER:
NOTES:
REF:

339

The _____ sort starts with the last element in the list and compares its value to
39. that of the item just above it in the list order.
a. bubble
c. heap
b. insertion
d. quick
A
ANSWER:
NOTES:
REF:

340

The process of a routine calling itself is called _____.


c. iteration
40. a. counting
b. recursion
d. modularization
B
ANSWER:
NOTES:
REF:

345

Which of the following sorting routines incorporates a problem solving technique


41. known as divide and conquer?
a. counting
c. bucket
b. radix
d. quicksort
D
ANSWER:
NOTES:
REF:

345

Which of the following routines implements two list structures to perform sorting
42. operations?
a. merge sort
c. bubble
b. selection sort
d. quicksort
A
ANSWER:
NOTES:
REF:

345

CS10 practice test


True/False
Indicate whether the sentence or statement is true or false.
A hard disk is the most common place to store files.
1.
T
ANSWER:
NOTES:
REF:

357

The fastest way to access data is via sequential access.


2.
F
ANSWER:
NOTES:
REF:

358

The NTFS file management system is used to locate files on a storage medium.
3.
T
ANSWER:
NOTES:
REF:

359

Tracks are contained within sectors.


4.
F
ANSWER:
NOTES:
REF:

361

With respect to FAT, data is stored in 512-byte sectors on the hard drive and
5. depending on the size of the file, the data might occupy one or more sectors.

T
ANSWER:
NOTES:
REF:

361

With the FAT file management system, deleting a file does not actually remove it
6. from the hard drive. Instead, a hex value of E5h is placed in the first position of
the file name.
T
ANSWER:
NOTES:
REF:

364

One of the main disadvantages of NTFS is the lack of security.


7.
F
ANSWER:
NOTES:
REF:

364

NTFS is geared toward a networked environment.


8.
T
ANSWER:
NOTES:
REF:

365

If your hard disk is 10GB or less then you may want to use NTFS because it is
9. more efficient in handling smaller volumes of data.
F
ANSWER:
NOTES:
REF:

367

Text files consist of ASCII or Unicode characters.


10.
T
ANSWER:
NOTES:
REF:

368

An advantage of relative file access is that records can be updated in place.


11.
T
ANSWER:
NOTES:
REF:

371

An advantage of FAT is that overall performance increases as more files are


12. stored on the partition.
F
ANSWER:
NOTES:
REF:

364

Under FAT, an administrator can specify which individual users or groups or


13. users can perform certain operations on files and directories.
F
ANSWER:
NOTES:
REF:

365

FAT has a larger overhead than NTFS.


14.
F
ANSWER:
NOTES:
REF:

366

All files are stored as text files.


15.
F
ANSWER:
NOTES:
REF:

368

An example of a sequential file might be an audio file or video file.


16.
T
ANSWER:
NOTES:
REF:

369

Updating a sequential file requires the entire file to be copied to a new file,
17. modifying the record as it is written to the new file.
T
ANSWER:
NOTES:
REF:

371

The disadvantage of relative file access is that disk space can be wasted if data
18. does not fill the entire record if some of the relative records do not have data.
T
ANSWER:
NOTES:
REF:

371-372

A hard disk is a sequential access device.


19.
F
ANSWER:
NOTES:

REF:

358

The first Microsoft file system was called the file allocation table.
20.
T
ANSWER:
NOTES:
REF:

359

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
A(n) ____ is the part of the operating system responsible for creating,
21. manipulating, renaming, copying, and removing files to and from storage
devices.
a. cluster
c. overflow area
b. file system
d. hash key
B
ANSWER:
NOTES:
REF:

357

Which of the following terms describes an organizational unit within a storage


22. medium that stores files, folders, and subdirectories?
a. Directory
c. File compression
b. Fragmentation
d. Volume
A
ANSWER:
NOTES:
REF:

358

____ implies that data is directly read or written anywhere on the disk.
c. Random access
23. a. Sequential access
b. Hashing
d. Collision

C
ANSWER:
NOTES:
REF:

358

The term ____ implies reading and writing data in order, from the beginning.
c. collision
24. a. random access
b. hashing
d. sequential access
D
ANSWER:
NOTES:
REF:

358

A(n) ____ contains a group of the smallest units that can be accessed on a disk.
c. NTFS
25. a. cluster
b. file system
d. FAT
A
ANSWER:
NOTES:
REF:

361

A(n) ____ is a drive or partition on a drive that is formatted with a file system.
c. hash key
26. a. hash algorithm
b. CPU
d. volume
D
ANSWER:
NOTES:
REF:

362

____ occurs when files have clusters scattered in different locations on the
27. storage medium rather than in contiguous locations.
a. Clusterization
c. Hashing
b. Disk fragmentation
d. Disk striping

B
ANSWER:
NOTES:
REF:

363

The ____ improves performance by minimizing movement of the read/write


28. heads.
a. file system
c. hash key
b. disk defragmenter
d. directory
B
ANSWER:
NOTES:
REF:

363

The ____ is used in NTFS to store data about every file and directory on the
29. volume.
a. directory
c. cluster
b. master file table
d. overflow area
B
ANSWER:
NOTES:
REF:

364

A(n) ____ is a storage location that contains data that is treated as either binary
30. or text.
a. cluster
c. file
b. overflow area
d. hash key
C
ANSWER:
NOTES:
REF:

368

____ are more compact and faster to access because the system does not have to
31. convert the data.
a. Binary files
c. Hash files

b. Sequential files

d. Random files

A
ANSWER:
NOTES:
REF:

369

____ file access allows you to mimic the look of a database table by storing
32. information in the file row by row, similar to a database record.
a. Hash
c. Sequential
b. Binary
d. Random
C
ANSWER:
NOTES:
REF:

370

____ is a common method used for accessing data either in a file or a database
33. table through the use of a unique value.
a. Clustering
c. Hashing
b. Disk fragmenting
d. File compression
C
ANSWER:
NOTES:
REF:

372

A(n) ____ is a unique value used in hashing algorithms.


c. directory
34. a. hash key
b. cluster
d. overflow area
A
ANSWER:
NOTES:
REF:

372

____ occur when the hashing algorithm generates the same relative key for more
35. than one original key value.

a. Clusters
b. Directories

c. Compressions
d. Collisions

D
ANSWER:
NOTES:
REF:

373

An area in a file that is used in case a collision occurs during the hashing
36. algorithm is called a(n) ____.
a. cluster
c. reserved area
b. overflow area
d. random area
B
ANSWER:
NOTES:
REF:

373

The ____ keeps track of which files are using which clusters.
c. hash key
37. a. file allocation table
b. directory
d. random area
A
ANSWER:
NOTES:
REF:

361

____ provides the ability to assign access rights to files and directories.
c. NTFS
38. a. FAT12
b. FAT24
d. FAT32
C
ANSWER:
NOTES:
REF:

365

____ is often referred to as a journaling file system because it keeps track of


39. transactions performed when working with files and directories.

a. FAT
b. NTFS

c. MFT
d. EFS
B

ANSWER:
NOTES:
REF:

364

Clusters are also called ____.


40. a. directories
b. allocation units
B
ANSWER:
NOTES:
REF:

361

c. algorithms
d. overflow areas

Ch11 internet test


True/False
Indicate whether the sentence or statement is true or false.
Assembly statements are read from right to left.
1.
T
ANSWER:
NOTES:
REF:

392

The assembly language instruction inc is used to compare values.


2.
F
ANSWER:
NOTES:
REF:

393

The assembly language instruction jnz tests the value of the zero flag maintained
3. by the system.
T
ANSWER:
NOTES:
REF:

394

Variable names in Java can begin with letters, underscores, and numbers.
4.
F
ANSWER:
NOTES:
REF:

404

In Java, you cannot associate a number with a boolean value.


5.

T
ANSWER:
NOTES:
REF:

407

The term attribute is used to describe the symbols used to manipulate the data
6. contained in variables.
F
ANSWER:
NOTES:
REF:

410

Based on the following code fragment, the value of iResult is 4.


7.
int iFirstNum = 15;
int iSecondNum = 10;
int iResult = 0;
int iResult = IFirstNum % iSecondNum;
F
ANSWER:
NOTES:
REF:

411

An expression is a programming statement that returns a value when executed.


8.
T
ANSWER:
NOTES:
REF:

415

The term precedence describes the order in which something is executed.


9.
T
ANSWER:

NOTES:
REF:

416

A function is a received value assigned to a variable that is used by a block of


10. code.
F
ANSWER:
NOTES:
REF:

420

Java implements the selection control structure through the use of the if, if-else,
11. if-else-if, and switch statements.
T
ANSWER:
NOTES:
REF:

430

It is always a good idea to use the switch statement when comparing string data
12. types.
F
ANSWER:
NOTES:
REF:

434

The following code fragment is an example of an endless loop:


13. int iCount = 1;
while (iCount <= 5)
{
System.out.println(I am on number + iCount);
}
T
ANSWER:
NOTES:

REF:

441

The for and while loops are considered postcondition loops.


14.
F
ANSWER:
NOTES:
REF:

441

The do-while loop is considered a precondition loop.


15.
F
ANSWER:
NOTES:
REF:

441

Typing the following statement at the command prompt will compile the
16. MyProg1.Java file.
java MyProg1.java
F
ANSWER:
NOTES:
REF:

445

A parent class is a generic class from which other classes can be created through
17. the process of inheritance.
T
ANSWER:
NOTES:
REF:

450

Encapsulation is the process of hiding an objects operations from other objects.


18.
T
ANSWER:

NOTES:
REF:

451

The term polymorphism is used to describe an objects ability to use the same
19. expression to denote different operations.
T
ANSWER:
NOTES:
REF:

452

A reserved word has a special instructional meaning.


20.
T
ANSWER:
NOTES:
REF:

404

The term identifier is used to describe the characteristics of an object.


21.
F
ANSWER:
NOTES:
REF:

448

The Hungarian notation is a variable naming method that gives each variable an
22. identifier at the beginning of the variable name describing the data type contents.
T
ANSWER:
NOTES:
REF:

408

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.

A(n) ____ is a collection of statements or steps that solve a problem and need to
23. be converted into a language that the computer understands in order to perform
one or more tasks.
a. algorithm
c. program
b. identifier
d. parameter
C
ANSWER:
NOTES:
REF:

384

A(n) ____ is a logically ordered set of statements used to solve a problem.


c. variable
24. a. identifier
b. algorithm
d. parameter
B
ANSWER:
NOTES:
REF:

384

A(n) ____ is a program included with an executable application that acts as the
25. translator between the program and the computer by converting program
statements one by one into a language the computer understands.
a. IDE
c. constructor
b. interpreter
d. endless loop
B
ANSWER:
NOTES:
REF:

384

A(n) ____ is a program that reads all statements from a program and converts
26. them into a computer language.
a. event
c. compiler
b. object
d. control structure
C
ANSWER:

NOTES:
REF:

384

A(n) ____ is a programming language that resembles more what a computer can
27. understand rather than a human
a. low-level language
c. event handler
b. high-level language
d. postcondition loop
A
ANSWER:
NOTES:
REF:

389

The ____ is the lowest-level language that is directly understood by a computer.


c. assembly language
28. a. object oriented language
b. constructor
d. machine language
D
ANSWER:
NOTES:
REF:

389

A(n) ____ resides between the lowest-level language and a higher-level


29. language; it assigns letter codes to each machine language instruction.
a. machine language
c. class
b. constructor
d. assembly language
D
ANSWER:
NOTES:
REF:

389

A(n) ____ reads assembly language code and converts it into machine language.
c. event handler
30. a. control structure
b. assembler
d. identifier
B
ANSWER:

NOTES:
REF:

389

A(n) ____ is a programming language that is more human-friendly or more


31. natural for humans to read.
a. assembly language
c. high-level language
b. machine language
d. interpreter
C
ANSWER:
NOTES:
REF:

389

The term ____ refers to the spelling and grammar used within a programming
32. language.
a. interpreter
c. declaration
b. syntax
d. event
B
ANSWER:
NOTES:
REF:

392

Which of the following terms describes a software development interface that


33. incorporates all of the necessary tools needed to write, compile, and distribute
programs?
a. Integrated development environment
b. Object oriented programming
c. Variable initialization
d. Hungarian notation
A
ANSWER:
NOTES:
REF:

395

A(n) ____ is a statement that associates an identifier with a variable.


c. variable
34. a. attribute

b. endless loop

d. declaration

D
ANSWER:
NOTES:
REF:

404

The storage requirement for the int data type in Java is ____.
c. 6 bytes
35. a. 2 bytes
b. 4 bytes
d. 8 bytes
B
ANSWER:
NOTES:
REF:

406

The process of combining or joining strings into one value is known as ____.
c. nesting
36. a. concatenation
b. instantiation
d. inheritance
A
ANSWER:
NOTES:
REF:

408

Assigning a value to a variable at declaration is called ____.


c. concatenation
37. a. startup
b. variable initialization
d. shortcut notation
B
ANSWER:
NOTES:
REF:

409

____ is a style of programming that involves representing items, things, and


38. people as objects rather than basing the logic around actions.
a. Object-oriented programming c. Variable initialization
b. Assembly programming
d. Polymorphism

A
ANSWER:
NOTES:
REF:

445

A(n) ____ is a template or mold used for defining new object types along with
39. their properties and behavior.
a. compiler
c. method
b. event
d. class
D
ANSWER:
NOTES:
REF:

448

A(n) ____ is a self-contained entity that consists of both data and procedures.
c. object
40. a. constructor
b. method
d. parameter
C
ANSWER:
NOTES:
REF:

448

____ is the process of creating an object based upon a class.


c. Instantiation
41. a. Inheritance
b. Concatenation
d. Variable initialization
C
ANSWER:
NOTES:
REF:

448

A(n) ____ is a special class function/method used for creating or instantiating an


42. object.
a. event handler
c. expression
b. constructor
d. function

B
ANSWER:
NOTES:
REF:

448

A(n) ____ is an action or occurrence that is recognized by a class.


c. variable
43. a. identifier
b. event
d. scope
B
ANSWER:
NOTES:
REF:

448

____ is the process of providing more class functionality by creating more


44. specific classes based on generic classes.
a. Variable initialization
c. Inheritance
b. Encapsulation
d. Polymorphism
C
ANSWER:
NOTES:
REF:

450

CS Chapter 12 Practice Test


True/False
Indicate whether the sentence or statement is true or false.
Spiral prototyping starts with an initial pass using the waterfall model.
1.
T
ANSWER:
NOTES:
REF:

469

One of the main rules of software engineering is that you should document the
2. information that clients give you.
T
ANSWER:
NOTES:
REF:

472

A component diagram depicts the physical architecture of a computer-based


3. system.
F
ANSWER:
NOTES:
REF:

474

User-phobia is the fear that if you include the end user in the design process, the
4. application will be a failure.
T
ANSWER:
NOTES:
REF:

485

One common technique to avoid scope creep is to use a phased approach to


5. software development.
T
ANSWER:
NOTES:
REF:

486

The project manager is assigned the role of creating and maintaining the database
6. structure.
F
ANSWER:
NOTES:
REF:

487

The database administrator is responsible for writing source code to meet the
7. functional needs of the end user.
F
ANSWER:
NOTES:
REF:

488

The software engineer is responsible for making sure programs function correctly
8. and meet the specified functional requirements set forth in the design document.
F
ANSWER:
NOTES:
REF:

489

Software can be modified to meet the changing needs of the end user.
9.
T
ANSWER:
NOTES:

REF:

470

An important reason for using a design document is that it can serve as a


10. blueprint.
T
ANSWER:
NOTES:
REF:

470

Once you have determined that a database is needed, you should create a data
11. dictionary.
T
ANSWER:
NOTES:
REF:

477

In order to get a head start, you should always begin writing source code while
12. seeking project specification approval.
F
ANSWER:
NOTES:
REF:

482

One of the rules of software engineering is that you should let the user help you
13. design the screens.
T
ANSWER:
NOTES:
REF:

483

One rule of software engineering is that you should be realistic when defining
14. project completion dates.

T
ANSWER:
NOTES:
REF:

483

You should have at least three people in charge of creating and maintaining the
15. databases.
F
ANSWER:
NOTES:
REF:

488

When testing, you should keep a log of the errors encountered during testing and
16. after the release of the application.
T
ANSWER:
NOTES:
REF:

489

Having a signature in the design document does not mean that it can be used as a
17. contract.
F
ANSWER:
NOTES:
REF:

484

The software engineer is responsible for pulling together all the pieces of the
18. project and incorporating them into the design document.
F
ANSWER:
NOTES:
REF:

487

The client is the driving force behind a software development project.


19.
T
ANSWER:
NOTES:
REF:

488

A class diagram shows an objects particular state at any given time.


20.
F
ANSWER:
NOTES:
REF:

473

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____ is the process of producing software applications.
c. UML
21. a. Database administration
b. Software engineering
d. SDLC
B
ANSWER:
NOTES:
REF:

468

The ____ describes the life of the application, including all of the stages involved
22. in the development, testing, installation, and maintenance of a program.
a. SDLC
c. SLC
b. UML
d. DBA
A
ANSWER:
NOTES:
REF:

468

____ determines whether the project is worth doing, and specifying the
23. advantages and disadvantages of this application.
a. Software specification
c. Scope creep
b. Project collaboration
d. Project feasibility
D
ANSWER:
NOTES:
REF:

468

Testing software to ensure that it meets the software specifications is called ____.
c. rapid prototype
24. a. scope creep
b. software validation
d. incremental development
B
ANSWER:
NOTES:
REF:

468

Modifying or changing the software to meet changing customer needs is called


25. ____.
a. software evolution
c. rapid prototyping
b. software modification
d. incremental development
A
ANSWER:
NOTES:
REF:

468

A(n) ____ is a standard or typical example that gives the end user a good idea of
26. what they will see when their application is completed.
a. flowchart
c. data dictionary
b. prototype
d. design document
B
ANSWER:
NOTES:
REF:

469

In the ____ model of software development, the fundamental processes involved


27. in creating the program are represented as phases. The output from each phase is
used as the input to the next phase.
a. build and fix
c. rapid prototyping
b. waterfall
d. spiral
B
ANSWER:
NOTES:
REF:

469

In the ____ model of software development, the developer writes a program and
28. continues to modify it until the system is functional.
a. rapid prototype
c. waterfall
b. incremental
d. build and fix
D
ANSWER:
NOTES:
REF:

469

With ____ tools are available that allow end users to work with prototypes of the
29. screens and other interfaces.
a. incremental development
c. build and fix
b. rapid prototyping
d. waterfall
B
ANSWER:
NOTES:
REF:

469

____ is a software modeling process that enables system developers to create a


30. blueprint showing the overall functionality of the program being engineered and
provides a way for the client and the developer to communicate.
a. SDLC
c. UML
b. Scope creep
d. Prototyping
C
ANSWER:

NOTES:
REF:

472

____ describe a systems behavior from a users standpoint.


c. Use cases
31. a. Classes
b. Objects
d. States
C
ANSWER:
NOTES:
REF:

473

The UML ____ diagram shows how one class communicates with another by
32. sending messages back and forth.
a. class
c. collaboration
b. sequence
d. sequence
D
ANSWER:
NOTES:
REF:

473

A(n) ____ diagram shows the events that occur within a use case or within an
33. objects behavior.
a. class
c. collaboration
b. activity
d. use case
B
ANSWER:
NOTES:
REF:

474

A(n) ____ is a combination of symbols and text that provide a visual description
34. of a process.
a. class
c. object
b. flowchart
d. component

B
ANSWER:
NOTES:
REF:

480

____ occurs when new changes are continually added to a project thus changing
35. the proposed completion date so that the project is never completed, but is
instead in constant improvement mode.
a. SDLC
c. Scope creep
b. Prototyping
d. Testing
C
ANSWER:
NOTES:
REF:

486

The ____ is the leader of the team and is responsible for choosing the right
36. players for the right positions.
a. database administrator
c. client
b. project manager
d. programmer
B
ANSWER:
NOTES:
REF:

486

The ____ is created by reviewing the screens and reports the end user would like
37. included in the application and determining which fields are essential to the
application.
a. use case
c. class diagram
b. data dictionary
d. sequence diagram
B
ANSWER:
NOTES:
REF:

487

The ____ is the interface between the testers, developers, and end users during
38. the creation and early release cycles of the product.
a. project manager
c. database administrator
b. programmer
d. customer relations
representative
D
ANSWER:
NOTES:
REF:

490

The ____ diagram shows how system elements work together to accomplish the
39. systems objectives.
a. activity
c. collaboration
b. component
d. deployment
C
ANSWER:
NOTES:
REF:

474

Software engineers and end users can both use the ____ to achieve a clearer
40. understanding of the data available for use in reports, screens, file transfers, and
other data operations.
a. data dictionary
c. sequence diagram
b. class diagram
d. use case
A
ANSWER:
NOTES:
REF:

477

CS13 Practice Test


True/False
Indicate whether the sentence or statement is true or false.
The UNIX rlogin command can be exploited by crackers.
1.
T
ANSWER:
NOTES:
REF:

504

The social interaction that preys on human gullibility, sympathy, or fear to take
2. advantage of the target is known as hacktivism.
F
ANSWER:
NOTES:
REF:

506

The term dumpster diving refers to an attack on a system that can include
3. snooping, eavesdropping, and interception.
F
ANSWER:
NOTES:
REF:

507

Risk is the relationship between vulnerability and threat.


4.
T
ANSWER:
NOTES:
REF:

508

The term vulnerability refers to the sensitivity of information and the skill level
5. needed by the attacker to threaten that information.

T
ANSWER:
NOTES:
REF:

508

Accountability involves making systems on which information sits accessible


6. and useful to those who should use them.
F
ANSWER:
NOTES:
REF:

510

A digital certificate is a string of bits used in an encryption algorithm to encrypt


7. or decrypt data.
F
ANSWER:
NOTES:
REF:

518

A firewall is software or hardware that acts as a protective filter between an


8. internal computer system and an external network such as the Internet.
T
ANSWER:
NOTES:
REF:

521

A demilitarized zone is a location outside the firewall that is more vulnerable to


9. attack from outside.
T
ANSWER:
NOTES:

REF:

523

Copyright protects the expression of the idea and not the idea itself.
10.
T
ANSWER:
NOTES:
REF:

525

A trade secret is a government grant that gives the sole right to make, use, and
11. sell an invention for a specified period of time.
F
ANSWER:
NOTES:
REF:

526

Reverse engineering occurs when someone tries to figure out the design of a
12. program or device by taking it apart and analyzing individual components.
T
ANSWER:
NOTES:
REF:

526

Repudiation is the science that studies the relationship between people and
13. machines.
F
ANSWER:
NOTES:
REF:

536

Spam is the name for an unsolicited e-mail.


14.
T
ANSWER:

NOTES:
REF:

538

Cookies are related to and sometimes used in conjunction with spyware, but
15. considered different because the user is assumed to be aware of their use.
T
ANSWER:
NOTES:
REF:

539

A modification attack denies legitimate users from using the system or from
16. gaining access to information.
F
ANSWER:
NOTES:
REF:

508

An Acceptable Use Policy defines who can use the company computers and
17. networks, when, and how.
T
ANSWER:
NOTES:
REF:

513

An example of a good password is: iopwmc.


18.
F
ANSWER:
NOTES:
REF:

514

Bits of code that uniquely identify a particular virus is called a virus signature.
19.

T
ANSWER:
NOTES:
REF:

517

A modification attack is a trap laid by a system administrator to catch and track


20. intruders.
F
ANSWER:
NOTES:
REF:

517

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
A(n) ____ is an unwelcome system intruder with malicious intent.
c. cracker
21. a. honey pot
b. software engineer
d. spammer
C
ANSWER:
NOTES:
REF:

502

The term ____ is used to describe the process of subverting the phone system in
22. order to get free service.
a. phreaking
c. biometrics
b. honey pot
d. callback
A
ANSWER:
NOTES:
REF:

502

A(n) ____ is a cracker motivated by the challenge of breaking into a system.


c. undirected hacker
23. a. script kiddie

b. Trojan horse

d. directed hacker

C
ANSWER:
NOTES:
REF:

502

A(n) ____ is generally a cracker motivated by greed and/or politics.


c. Trojan horse
24. a. undirected hacker
b. script kiddies
d. directed hacker
D
ANSWER:
NOTES:
REF:

502

A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
25. developed by others.
a. cracker
c. script kiddie
b. reverse engineer
d. Trojan horse
C
ANSWER:
NOTES:
REF:

503

Cracking into a system as a political act is known as ____.


c. social engineering
26. a. hacktivism
b. repudiation
d. phreaking
A
ANSWER:
NOTES:
REF:

503

An anonymous document that justifies cracking into a systems as an ethical


27. exercise is called ____.
a. spyware
c. the cracker bible

b. the Hackers Manifesto

d. Phreakers Way

B
ANSWER:
NOTES:
REF:

503

____ are shortcuts into programs created by system designers to facilitate system
28. maintenance but used and abused by crackers.
a. Checksums
c. Backdoors
b. Heuristics
d. Bots
C
ANSWER:
NOTES:
REF:

504

A(n) ____ occurs when a program tries to place more information into a memory
29. location than it can handle.
a. access attack
c. virus attack
b. buffer overflow
d. modification attack
B
ANSWER:
NOTES:
REF:

504

Code designed to breach your system security and threaten your digital
30. information is known as ____.
a. malicious code
c. honey pots
b. digital certificates
d. patents
A
ANSWER:
NOTES:
REF:

505

A(n) ____ is an uninvited guest program on your computer with the potential to
31. damage files and the operating system.
a. proxy firewall
c. virus
b. sniffer
d. DMZ
C
ANSWER:
NOTES:
REF:

505

A(n) ____ is a software program that can roam the Internet autonomously.
c. honey pot
32. a. cookie
b. digital certificate
d. bot
D
ANSWER:
NOTES:
REF:

505

A(n) ____ is a software program that allows the user to listen in on network
33. traffic.
a. Trojan horse
c. worm
b. sniffer
d. honey pot
B
ANSWER:
NOTES:
REF:

508

Transforming original data into coded data so that only authorized parties can
34. interpret it is known as ____.
a. authentication
c. piracy
b. packet filtering
d. encryption
D
ANSWER:
NOTES:
REF:

510

The term ____ is used to describe biological identification, such as fingerprints,


35. voice dynamics, or retinal scans.
a. biometrics
c. ergonomics
b. cookie
d. hacktivism
A
ANSWER:
NOTES:
REF:

516

A(n) ____ firewall establishes a new link between each packet of information
36. and its destination.
a. proxy
c. biometric
b. digital
d. packet-filtering
A
ANSWER:
NOTES:
REF:

522

____ are the moral principles for judging right or wrong behavior held by an
37. individual or group.
a. Digital certificates
c. Ethics
b. Laws
d. Ergonomics
C
ANSWER:
NOTES:
REF:

531

____ is the illegal copying of software .


c. Social engineering
38. a. Software piracy
b. Biometrics
d. Dumpster diving
A
ANSWER:
NOTES:

REF:

532

____ is a catchall phrase for programs that sit on your computer, with or without
39. your knowledge, observing your computer activities.
a. Cookie
c. Spyware
b. Encryption
d. Social engineering
C
ANSWER:
NOTES:
REF:

539

A(n) ____ is characterized by three things: targets that might be attacked, agents
40. or attackers, and events.
a. risk
c. copyright
b. callback
d. threat
D
ANSWER:
NOTES:
REF:

509

CS14-practice
True/False
Indicate whether the sentence or statement is true or false.
With the Von Neumann machine, instruction execution is carried out by a central
1. processing unit that contains a control unit, an arithmetic logic unit, and registers.
T
ANSWER:
NOTES:
REF:

554

The CPU has the ability to accept input from and provide output to external
2. devices.
T
ANSWER:
NOTES:
REF:

554

Increasing the CPU clock speed by a given amount always results in a


3. proportional overall speed increase in the computer.
F
ANSWER:
NOTES:
REF:

554

A bit can represent four values.


4.
F
ANSWER:
NOTES:
REF:

556

A qubit can only represent two values.


5.
F
ANSWER:
NOTES:
REF:

556

Prototype biological computers can perform operations at the rate of


6. approximately one billion per second, which is comparable to the speed of the
Pentium 2.4 GHz CPU.
T
ANSWER:
NOTES:
REF:

556

Wearable computers have been designed to be used as language translators.


7.
T
ANSWER:
NOTES:
REF:

557

A CD can store approximately 700 KB of data.


8.
F
ANSWER:
NOTES:
REF:

561

Optical storage is more stable than magnetic storage and is unaffected by outside
9. magnetic influences.
T
ANSWER:
NOTES:

REF:

561

DVDs have high densities and can store information in multiple layers and on
10. multiple sides of the platter.
T
ANSWER:
NOTES:
REF:

561

DVDs can store from 4.7 MB to 17 MB of data.


11.
F
ANSWER:
NOTES:
REF:

561

Current hard disk technology allows for hard drives with over 500 GB of
12. capacity.
T
ANSWER:
NOTES:
REF:

562

Moving parts are prone to mechanical failure.


13.
T
ANSWER:
NOTES:
REF:

562

The cost of manufacturing storage devices with no moving parts is considerably


14. more than a conventional hard drive.
F
ANSWER:

NOTES:
REF:

562

One of the problems with MRAM is its high power requirement to read and write
15. data.
F
ANSWER:
NOTES:
REF:

564

The main purpose of MRAM is to replace DRAM.


16.
T
ANSWER:
NOTES:
REF:

564

Some types of polymer memory can only be written once, while others can be
17. rewritten many thousands of times.
T
ANSWER:
NOTES:
REF:

565

Polymer memory can hold at most 100 CDs worth of music.


18.
F
ANSWER:
NOTES:
REF:

565

Input and output devices increase the speed of the typical computer.
19.

F
ANSWER:
NOTES:
REF:

554

The original Eniac computer occupied approximately 50 square feet of space.


20.
F
ANSWER:
NOTES:
REF:

557

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____ instructions are processed sequentially by fetching an instruction from
21. memory, and then executing that instruction.
a. Binary
c. DRAM
b. MRAM
d. USB
A
ANSWER:
NOTES:
REF:

554

A(n) ____ is a theoretical framework, or a way of doing things.


c. polymer
22. a. expert system
b. paradigm
d. MRAM
B
ANSWER:
NOTES:
REF:

555

____ is the study of matter and radiation at the atomic level.


c. Robotics
23. a. Fuzzy logic
b. Pattern recognition
d. Quantum mechanics

D
ANSWER:
NOTES:
REF:

556

A specialized computer designed to record and play back video content from
24. cable and satellite sources is called a(n) ____.
a. expert system
c. quantum computer
b. digital video recorder
d. robot
B
ANSWER:
NOTES:
REF:

559

____ is a method of splitting a laser beam and using a device called a spatial light
25. modulator to store full pages of information in layers on a crystal material.
a. Fuzzy logic
c. Holographic storage
b. Pattern recognition
d. Speech recognition
C
ANSWER:
NOTES:
REF:

561

____ functions as erasable, rewritable ROM memory.


c. Speech recognition
26. a. Flash memory
b. Natural language processing d. Machine learning
A
ANSWER:
NOTES:
REF:

562

Which of the following terms describes flash memory in a small, durable


27. portable case that can be plugged into a USB port of a computer and used in the
same manner as a disk drive?

a. USB cache
b. USB port

c. USB disk
d. USB drive

D
ANSWER:
NOTES:
REF:

563

Which of the following terms describes memory that uses the polarization of
28. microscopic magnetic layers to store ones and zeros that remain after the power
source is removed?
a. DRAM
c. ROM
b. MRAM
d. SRAM
B
ANSWER:
NOTES:
REF:

564

____ is the science and engineering of making intelligent machines.


c. Quantum mechanics
29. a. Nanotechnology
b. Magnetic storage
d. Artificial intelligence
D
ANSWER:
NOTES:
REF:

568

____ is a superset of conventional logic that has been extended to handle the
30. concept of partial truth.
a. Neural networks
c. Fuzzy logic
b. Robotics
d. Speech recognition
C
ANSWER:
NOTES:
REF:

568

____ are well suited for applications such as visual speech recognition
31. applications.
a. DVRs
c. Turing tests
b. Quantum computers
d. Neural networks
D
ANSWER:
NOTES:
REF:

569

A(n) ____ is a computer program that simulates the judgement and behavior of a
32. human or an organization that has expert knowledge and experience in a
particular field.
a. flash memory
c. expert system
b. neural network
d. USB drive
C
ANSWER:
NOTES:
REF:

572

Telephone support and hot lines, such as a poison control center, can make use of
33. ____.
a. expert systems
c. SDRAM
b. MRAM
d. ROM
A
ANSWER:
NOTES:
REF:

572

____ processing involves computer applications that can recognize and interact
34. with natural language text.
a. Assembly language
c. High-level language
b. Machine language
d. Natural language
D
ANSWER:
NOTES:

REF:

573

The science of ____ is primarily concerned with the mechanics and electronics
35. that are used to carry out the results of the other areas of artificial intelligence.
a. fuzzy logic
c. pattern recognition
b. robotics
d. natural language processing
B
ANSWER:
NOTES:
REF:

573

It is thought that each neuron in the brain may have as many as connections to
36. adjacent neurons.
a. 10
c. 10,000
b. 100
d. 1,000,000
C
ANSWER:
NOTES:
REF:

569

In order for a computer to emulate human behavior and reasoning, it needs to


37. have the ability to ____.
a. walk
c. learn
b. talk
d. hear
C
ANSWER:
NOTES:
REF:

571

The concept of each person interacting with many, sometimes invisible


38. computers has been named ____ by computer scientist Mark Weiser.
a. 1984
c. massive parallelism
b. ubiquitous computing
d. nanotechnology
B
ANSWER:

NOTES:
REF:

559

Effort is ongoing to make ____ available on cell phones.


c. VCRs
39. a. HDTV
b. streaming audio
d. streaming video
D
ANSWER:
NOTES:
REF:

559

At present, flash memories come in sizes up to ____.


c. 2 GB
40. a. 1 MB
b. 100 MB
d. 4 TB
C
ANSWER:
NOTES:
REF:

562