Computer Programming Mid-term

question

Tablet PC
answer

Which would be classified as a mobile computing device?
question

Printer
answer

Which is not an input device?
question

Hardware
answer

Which is the physical aspect of the computer?
question

CPU
answer

Which processes data and controls the flow of data between the computer’s other units?
question

Cache
answer

SRAM (Static RAM) is also referred to as
question

Binary
answer

The number system used in computers is called
question

Two : on, off
answer

How many states do the electrical circuits on an IC (integrated circuit) have?
question

A Bit
answer

A single 0 or 1 in the binary code
question

Bytes
answer

Computer memory capacity and file size are measured in
question

ROM
answer

The ________is high speed memory that stores frequently accessed instructions.
question

RAM
answer

__________ holds data for all applications that are currently running on your computer, but only while the power is on.
question

GHz
answer

Speeds are measured in MHz or _________ rate.
question

1024KB
answer

How many KB in 1 MB?
question

Electrically Erasable Programmable Read-Only Memory
answer

What type of memory does a flash drive use?
question

ENIAC
answer

Which of the first generation computers was a secret military project during WWII used to calculate trajectory of artillery shells?
question

Ada Byron
answer

Who is called the first programmer due to writing a program based on the design of the Analytical Machine?
question

UNIVAC
answer

What computer was sold to US Census Bureau in 1951?
question

Transistor
answer

What sparked the second generation computers?
question

The invention of the Integrated Circuit
answer

What sparked the beginning of third generation computers?
question

The microprocessor
answer

What made it possible to build the microcomputer (PC)?
question

It performs logic and arithmetic operations and makes comparisons
answer

What is the purpose of the ALU?
question

Machine Code
answer

What type of code is directly understood by the CPU?
question

C
answer

All of the following were developed in the 1990’s except:
question

High Level
answer

Which category of programming languages has the most abstraction from the hardware?
question

Ada Byron
answer

Who wrote the first computer program?
question

Pascaline
answer

A set of gears similar to a clock that only performed addition
question

Stepped Reckoner
answer

Cylindrical wheel with movable carriage that can add, subtract, multiply, divide, square roots
question

Difference Machine
answer

A machine that was never built that was to produce table of numbers used by ships’ navigators.
question

Analytical Machine
answer

A machine that was to perform variety of calculations by following a set of instructions (or program) on punched cards. It was never built but was used as a model for modern computer.
question

Hollerith’s Tabulating Machine
answer

Machine create for US Census that had holes representing information to be tabulated were punched in cards
question

Mark I
answer

Mechanical telephone replay switches to store information and accepted data on punch cards.
question

Identity Theft Penalty Enhancement Act of 2004
answer

Establishes penalties for aggravated identity theft
question

Federal Information Security Management Act of 2002 (FISMA)
answer

Requires federal agencies to develop, document and implement an agency-wide program to provide information security.
question

Consumer Credit Reporting Reform Act of 1996
answer

Addresses data collection by credit, insurance and employment agencies
question

Privacy Act of 1974
answer

Restricts the way in which personal data can be used by federal agencies
question

Right to Financial Privacy Act of 1978
answer

Requires government authorities have a subpoena, summons or search warrant to access an individual’s financial records
question

Electronic Communications Privacy Act of 1986 (ECPA)
answer

Makes it a crime to access electronic data without authorization
question

Electronic Freedom of Information Act of 1996
answer

Requires federal government agencies to make certain agency information available for public inspection
question

Children’s Online Privacy Protection Act of 1988 (COPPA)
answer

Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent.
question

Safety and Freedom through Encryption Act of 1999 (SAFE)
answer

Gives Americans the freedom to use any type of encryption to protect their confidential information.
question

Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
answer

Gives law enforcement the ability to monitor individual’s email and web activity
question

Ergonomics
answer

The science that studies safe work environments.
question

Environmental Concerns
answer

Power & paper waste
question

Employee monitoring
answer

Issues with computers in the workplace
question

Invasion of privacy
answer

identity theft
question

NET (No Electronic Theft) Act of 1997
answer

Protects against copyright infringement
question

Piracy
answer

Illegal copies being distributed
question

Virus
answer

Program or series of instruction that can replicate without the user’s knowledge
question

Trojan Horse
answer

Program or series of instruction that appears as something else
question

Worm
answer

Program that is able to reproduce itself over a network
question

Antivirus programs
answer

Install on computers to detect and remove code before it can replicated or damage data
question

Hacker
answer

Illegal act to gain access to large computer systems to perform acts of vandalism.
question

Phishing
answer

Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft
question

Which of the following would be part of an Acceptable Use Policy? There is more than one.
answer

Do not access, upload, download, or distribute inappropriate materials, Use appropriate language, Do not access another’s account, do not reveal personal information
question

Pseudocode
answer

English-language statements that describe the processing steps of a program in paragraph form
question

Direction of the arrow
answer

What indicates the flow of logic in a flowchart?
question

Which of the following should be reviewed when checking your code?
answer

Check expected input, unexpected input, boundaries, null input.
question

Algorithm
answer

A list of steps to solve a problem.
question

Steps of the programming process
answer

Identify the problem, design the solution, write the program, test the program, document and maintain the program.
question

Syntax
answer

The type of error that occurs when the programmer does not follow the rules of the programming language.
question

Logic Error
answer

When running a program to average a list of numbers, the programmer notices that the average is not correct. This is an example of what type of error?
question

Top-Down Design
answer

What is most frequently used design in the programming process?
question

Modularization
answer

Breaking down a problem into smaller sub-problems
question

Requirements and Specifications
answer

The parts of identifying the problem.
question

Oval
answer

Terminator (Start/ Stop) flowchart shape
question

Rectangle
answer

Process flowchart shape
question

Parallelogram
answer

Input/Output flowchart shape
question

Diamond
answer

Decision flowchart shape
question

Runtime Errors
answer

Errors that occur while your program runs.
question

Static
answer

When you want a variable, like a counter, to hold its value, it should be declared as.
question

Constant
answer

Which type of variable that once declared cannot be changed by the program?
question

Compilation Error
answer

Another name of a syntax error.

Get instant access to
all materials

Become a Member