Principles of Computing Final – Flashcards

157 test answers

Unlock all answers in this set

Unlock answers 157
question
Actual computer errors are very rare. t/f
answer
true
question
Computer memory is divided into bytes of 9 bits. t/f
answer
false
question
Every memory location in the computer is numbered, starting at 0. t/f
answer
true
question
Each byte in memory is limited in size. t/f
answer
true
question
A megabyte is exactly a million bytes. t/f
answer
false
Unlock the answer
question
The ADD instruction adds the contents of a location, not the number of the location. t/f
answer
true
Unlock the answer
question
The ability to store different values in its memory locations makes the computer a flexible tool. t/f
answer
true
Unlock the answer
question
Device drivers must be purchased separately from the peripheral. t/f
answer
false
Unlock the answer
question
Any 2 GHz computer will always run faster than a 1 GHz computer. t/f
answer
false
Unlock the answer
question
Starting a computer is called booting. t/f
answer
true
Unlock the answer
question
An interrupt is a request for the operating system to do something. t/f
answer
true
Unlock the answer
question
Miniaturization is the biggest achievement of microchip technology. t/f
answer
false
Unlock the answer
question
A canal is the path in a semiconductor where electricity travels. t/f
answer
false
Unlock the answer
question
A field effect transistor controls the flow of electricity through a circuit without ever touching the circuit. t/f
answer
true
Unlock the answer
question
The fear of computers taking over the world has died down since the 1950s and 1960s. t/f
answer
true
Unlock the answer
question
Memory is measured in: a) megabytes b) bytes c) MB d) all of the above
answer
d) all of the above
Unlock the answer
question
Computer memory is like: a) a rule b) a row of plastic cups c) a number line d) an analog clock
answer
b) a row of plastic cups
Unlock the answer
question
The control unit of the computer is involved in the: a) Instruction Fetch & Instruction Execute Cycle b) Control Cycle c) Instruction Execution d) Data Fetch
answer
a) Instruction Fetch & Instruction Execute Cycle
Unlock the answer
question
The peripheral most closely tied to the computer is the: a) monitor b) mouse c) hard disk d) keyboard
answer
c) hard disk
Unlock the answer
question
Computer instructions are: a) 1 byte long b) 2 bytes long c) 4 bytes long d) 8 bytes long
answer
c) 4 bytes long
Unlock the answer
question
The program counter keeps track of the: a) number of programs the computer is running b) number of memory addresses used c) next instruction in the Control unit d) current instruction in Fetch/Execute
answer
c) next instruction in the Control unit
Unlock the answer
question
The computer's speed is measured in megahertz, that is: a) thousands of cycles per minute b) millions of cycles per minute c) thousands of cycles per second d) millions of cycles per second
answer
d) millions of cycles per second
Unlock the answer
question
On the computer, a billion clock ticks in a second is called: a) megahertz b) gigahertz c) bilahertz d) terahertz
answer
b) gigahertz
Unlock the answer
question
Computer speed is dependent upon all of the following except: a) processor speed b) memory size c) byte size d) instruction set
answer
c) byte size
Unlock the answer
question
A clock speed of 1 GHz means the computer runs: a) exactly 1 billion instructions per second b) at least 1 billion instructions per second c) up to 1 billion instructions per second d) around 1 billion instructions per second
answer
d) around 1 billion instructions per second
Unlock the answer
question
A page fault is: a) an attempt by the computer to run instructions stored on the hard disk b) the process the computer uses to start itself c) an error the computer makes when a device driver is missing d) an out of memory error
answer
a) an attempt by the computer to run instructions stored on the hard disk
Unlock the answer
question
Which of the following is not controlled by the operating system? a) printing and mouse movement b) system integration c) monitor display d) memory management
answer
b) system integration
Unlock the answer
question
Integrated circuits are so remarkable because: a) they use a photographic process in manufacturing b) the entire circuit is made of the same types of materials c) they combine millions of programs on the same chip d) more than one of the above
answer
d) more than one of the above
Unlock the answer
question
The "wires" on a computer chip are made from: a) copper b) aluminum c) iron d) gold
answer
b) aluminum
Unlock the answer
question
The lowest programming language that humans use is: a) binary b) assembly c) Java d) HTML
answer
b) assembly
Unlock the answer
question
Which of the following is not an operating system? a) Apple Mac X b) Unix c) Linux d) Assembly
answer
d) Assembly
Unlock the answer
question
Management of a computer's hardware is done with: a) a programming language b) a compiler c) an operating system d) all of the above
answer
c) an operating system
Unlock the answer
question
How many steps are a part of the Fetch/Execute cycle? a) 2 b) 4 c) 5 d) 8
answer
c) 5
Unlock the answer
question
The next instruction must be at the memory address: a) PC b) PC + 4 c) PC-2 d) PC*4
answer
b) PC + 4
Unlock the answer
question
Information is generated when buying goods and services at a store. t/f
answer
true
Unlock the answer
question
The vast majority of business transactions are anonymous. t/f
answer
false
Unlock the answer
question
American privacy laws are much stricter than European laws. t/f
answer
false
Unlock the answer
question
The United States has not adopted the OECD principles. t/f
answer
true
Unlock the answer
question
Globalization is likely to increase privacy. t/f
answer
true
Unlock the answer
question
The laws protecting the information of individuals place more limits on the government than on business. t/f
answer
true
Unlock the answer
question
The United States provides almost no enforcement of OECD privacy principles. t/f
answer
true
Unlock the answer
question
A company can place a cookie on your computer even if you've never visited the Web site. t/f
answer
true
Unlock the answer
question
Linking third-party serial numbers embedded in cookies is illegal. t/f
answer
false
Unlock the answer
question
Cooking can be used to track ad placement on Web sites. t/f
answer
true
Unlock the answer
question
The biggest information privacy issue in the United States is the concern between approval and objection of information use. t/f
answer
true
Unlock the answer
question
The RSA public key cryptosystem code has not been cracked. t/f
answer
false
Unlock the answer
question
The Do-Not-Call List was so successful, it has now been applied to email. t/f
answer
false
Unlock the answer
question
Identity theft is the crime of posing as someone else for fraudulent purpose. t/f
answer
true
Unlock the answer
question
Partial bakcups should be made more often than full backups. t/f
answer
true
Unlock the answer
question
Emptying the trash is no guarantee that the data has been erased. t/f
answer
true
Unlock the answer
question
Privacy laws in Hong Kong are stricter than those in the United States. t/f
answer
true
Unlock the answer
question
There are only two basic threats to privacy. t/f
answer
true
Unlock the answer
question
Non-EU countries that want information on Eu citizens must show that they have privacy laws consistent with the OECD principles. t/f
answer
true
Unlock the answer
question
"Opt-in" means the business can use it unless the person explicitly prohibits the new use. t/f
answer
false
Unlock the answer
question
Modern browsers let you control the cookie policy for your computer. t/f
answer
true
Unlock the answer
question
In the United States the protection of an individual's privacy is the responsibility of the government. t/f
answer
false
Unlock the answer
question
The purpose of encryption is to allow private transmission and storage of sensitive information. t/f
answer
true
Unlock the answer
question
The frequency count of English is fixed. t/f
answer
false
Unlock the answer
question
Personal computers can only be backed up to another hard disk. t/f
answer
true
Unlock the answer
question
Most Americans wrongly assume that their privacy regarding business information is restricted to __________.
answer
private use
Unlock the answer
question
__________ and __________ are the two biggest threats to privacy.
answer
Government and Business
Unlock the answer
question
Five principles for the collection and use of personal information were first laid out by the __________.
answer
Code of Fair Information Practices
Unlock the answer
question
The __________ limits the government's ability to interfere with people's privacy.
answer
Privacy Act of 1974
Unlock the answer
question
The United states takes a __________ approach to individual privacy by passing laws to limit specific industries or business practices.
answer
sectoral
Unlock the answer
question
The concept of __________ allows data on people from EC countries to be transferred to other countries, providing the company complies with OECD rules.
answer
Safe Harbor
Unlock the answer
question
__________ is the process of recovering encrypted cipher text.
answer
Decryption
Unlock the answer
question
__________ can be described as x or y but not both.
answer
XOR
Unlock the answer
question
Public key encryption techniques are known as __________.
answer
strong encryption
Unlock the answer
question
A(n) __________ is a security bypass that could be used to send cleartext to security officials.
answer
trapdoor
Unlock the answer
question
__________ systems would bypass security by requiring software vendors to register their encryption keys.
answer
Key escrow
Unlock the answer
question
Which principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date?
answer
Quality Principle
Unlock the answer
question
A(n) __________ solution provides consistent protection to all information.
answer
Omnibus
Unlock the answer
question
FTC guidelines require __________ only for highly sensitive information like medical data.
answer
opt-in
Unlock the answer
question
__________ are an elegant way for servers to give clients the illusion they are the only one being served.
answer
Cookies
Unlock the answer
question
Spreadsheets are used primarily in: a) education b) business c) government d) the home
answer
c) government
Unlock the answer
question
The basic unit of a spreadsheet is a: a) box b) cube c) cell d) grid
answer
c) cell
Unlock the answer
question
Speadsheets: a) can only be sorted by column A b) can be sorted by any column provided the column is named c) are sorted by rows then columns d) can be sorted by any column
answer
d) can be sorted by any column
Unlock the answer
question
A range of cells can include: a) cells from more than one row b) cells from more than one column c) the entire spreadsheet d) all of the above
answer
d) all of the above
Unlock the answer
question
Data too wide to fit in a cell: a) is truncated b) is abbreviated c) is hyphenated d) cannot be entered into a cell
answer
a) is truncated
Unlock the answer
question
The main purpose of a spreadsheet is to: a) display numerical results b) process numerical data c) organize factual data d) graphically present data
answer
b) process numerical data
Unlock the answer
question
To stop editing a cell and move to another cell, use the: a) arrow key b) tab key c) Enter key d) escape key
answer
c) Enter key
Unlock the answer
question
Common, summary applications in a spreadsheet are handled by: a) formulas b) functions c) tables d) formatting
answer
b) functions
Unlock the answer
question
Spreadsheets have: a) over 50 build-in functions b) 76 built-in functions c) nearly 100 built-in functions d) over 100 built-in functions
answer
d) over 100 built-in functions
Unlock the answer
question
To get a cell to display $10.00 you must: a) enter 10.00 and format the cell to currency b) enter $10.00 in the cell c) enter $1&0 in the cell d) it cannot be done
answer
a) enter 10.00 and format the cell to currency
Unlock the answer
question
To select a range of cells: a) double-click the first and last cells b) drag the cursor across the cells c) click Select on the Edit menu d) click the Add icon
answer
b) drag the cursor across the cells
Unlock the answer
question
To clear cells using Excel, select: a) Edit>Clear>Cells b) Edit> Delete Cells c) Edit> Clear> All d) Edit> Delete Contents...
answer
c) Edit>Clear>All
Unlock the answer
question
A formula reference begins with: a) f() b) a cell reference c) any number d) the equal sign (=)
answer
d) the equal sign (=)
Unlock the answer
question
Spreadsheet columns are labeled with __________.
answer
letters
Unlock the answer
question
The rows of a spreadsheet are designated with __________.
answer
numbers
Unlock the answer
question
The __________ determines whether a spreadsheet cell contains a formula or data.
answer
equal sign
Unlock the answer
question
Spreadsheet formulas are edited in the __________.
answer
edit window
Unlock the answer
question
An absolute cell reference makes use of the __________ symbol in its formula.
answer
$
Unlock the answer
question
The process of copying from one cell to many others by simply dragging is called __________.
answer
filling
Unlock the answer
question
Control over the style of the display of a cell is called ___________.
answer
formatting
Unlock the answer
question
Cell references that do not change when copied from one cell to another are called __________ references.
answer
absolute
Unlock the answer
question
The Min function is used to display the __________ item in a list.
answer
smallest
Unlock the answer
question
A file with a .txt extension probably contains __________.
answer
text
Unlock the answer
question
To change the way contents of a cell appears, you change its __________.
answer
format
Unlock the answer
question
To help us create a list, spreadsheets give us an array of __________ that we fill in to set up our list.
answer
cells
Unlock the answer
question
Flexibility is an important characteristic of a spreadsheet. t/f
answer
false
Unlock the answer
question
Summary information should be placed at the top of a spreadsheet. t/f
answer
false
Unlock the answer
question
When working with a spreadsheet, use different fonts for headings and data. t/f
answer
true
Unlock the answer
question
Use the Edit menu to insert comments in Excel. t/f
answer
false
Unlock the answer
question
In a spreadsheet, conditional formatting allows to you specify a format for cells that meet certain criteria. t/f
answer
true
Unlock the answer
question
Excel provides automatic currency conversion with no need to write special formulas. t/f
answer
false
Unlock the answer
question
In a spreadsheet, names can only be applied to cell references, not individual cells.
answer
false
Unlock the answer
question
Direct changes to a spreadsheet's values are the best way to perform what if analysis.
answer
true
Unlock the answer
question
To run the actual filtering operation in a spreadsheet, select a cell in the column to be filtered.
answer
true
Unlock the answer
question
The first rule of setting up effective spreadsheets is: a) make if visually interesting b) focus on form c) avoid explanations that clutter the spreadsheet d) explain everything
answer
b) focus on form
Unlock the answer
question
Place descriptive information: a) on the top and left b) on the top and right c) on the bottom and left d) on the bottom and right
answer
a) on the top and left
Unlock the answer
question
In the Conditional Formatting dialog box, the default condition is: a) equal to b) less than c) greater than d) between
answer
d) between
Unlock the answer
question
What symbol is used to denote absolute cell references? a) equal sign (=) b) dollar sign ($) c) percent sign (%) d) tilde (~)
answer
b) dollar sign ($)
Unlock the answer
question
The IF function specifies: a) action on true outcome b) condition c) action of false outcome d) all of the above
answer
d) all of the above
Unlock the answer
question
To access letters of a cell value for such comparisons, use the function: a) LETTER() b) INDEX() c) IF() d) LEFT()
answer
d) LEFT()
Unlock the answer
question
A word or a phrase applied to a cell or range of cells is called its: a) value b) name c) literal d) range id
answer
b) name
Unlock the answer
question
The Scenario Manager window is accessed via the: a) Tools menu b) File menu c) Edit menu d) Formulas menu
answer
a) Tools menu
Unlock the answer
question
What method is used to access subsets of information? a) logging b) conditional formatting c) sorting d) filtering
answer
d) filtering
Unlock the answer
question
Inconsistency is the main reason to avoid redundancy of information in a database. t/f
answer
true
Unlock the answer
question
Relationships connect rows of one table with rows of another table. t/f
answer
true
Unlock the answer
question
Relationships are part of the metadata of a database. t/f
answer
true
Unlock the answer
question
Relationships are specified by the user of the database. t/f
answer
false
Unlock the answer
question
For two tables to be related, they must share a common field. t/f
answer
true
Unlock the answer
question
The shared field between two tables cannot be unique. t/f
answer
false
Unlock the answer
question
Access to sensitive information in a database should be limited. t/f
answer
true
Unlock the answer
question
Logical database duplicates information that exists in the tables of a physical database. t/f
answer
true
Unlock the answer
question
Queries are used to create views. t/f
answer
true
Unlock the answer
question
A logical table can be created with information from no more than two physical tables. t/f
answer
false
Unlock the answer
question
To successfully use a database, a user should know SQL.
answer
false
Unlock the answer
question
An instance of a database table is a table with a specific set of rows. t/f
answer
true
Unlock the answer
question
A root element is the tag that encloses all of the content of the XML file. t/f
answer
true
Unlock the answer
question
The key field for the student database on a campus is probably the student: a) address b) ID c) phone d) last name
answer
b) ID
Unlock the answer
question
A unique identifier stored in place of information that might be repeated is known as a: a) key field b) foreign key c) data key d) lookup key
answer
b) foreign key
Unlock the answer
question
A logical database: a) is created from existing information b) is created fresh each time it is needed c) usually uses information from multiple tables d) all of the above
answer
d) all of the above
Unlock the answer
question
Associating information from two or more tables is done with a: a) Join operation b) Bind operation c) Combine operation d) Unite operation
answer
a) Join operation
Unlock the answer
question
Logical tables are created with a: a) view b) query c) relationship d) key
answer
b) query
Unlock the answer
question
Queries are a part of the: a) logical database b) database schema c) metadata d) all of the above
answer
d) all of the above
Unlock the answer
question
In SQL, the INNER JOIN is used to combine: a) two or more logical tables to form a physical table b) two or more physical tables to form a logical tables c) tables in the same way the Product operation is used d) all of the above
answer
d) all of the above
Unlock the answer
question
The SQL WHERE clause is similar to the: a) Join operation b) Select operation c) Union operation d) Add operation
answer
...
Unlock the answer
question
Relationships in a database schema show how: a) tables are related to one another b) queries are related to one another c) information in a table is related to information in another table d) fields are related to one another in a table
answer
a) tables are related to one another
Unlock the answer
question
An ER diagram shows relationships between: a) tables in a database b) entities in a database c) fields in a database d) queries in a database
answer
b) entities in a database
Unlock the answer
question
A set of attributes for which all entities are different is known as a: a) primary key b) secondary key c) candidate key d) provisional key
answer
c) candidate key
Unlock the answer
question
XML should be edited using a: a) word processor b) text editor c) Web browser d) spreadsheet program
answer
b) text editor
Unlock the answer
question
XML tags may not contain: a) spaces b) uppercase letters c) lowercase letters d) numbers
answer
a) spaces
Unlock the answer
question
When Turing developed his test, researchers believed that "natural language" was beyond the abilities of computers. t/f
answer
true
Unlock the answer
question
Any computer using only very simple instructions can simulate any other computer. t/f
answer
true
Unlock the answer
question
When a computer plays chess, the information is represented in: a) natural language b) bits c) black and white d) integers
answer
b) bits
Unlock the answer
question
__________ computer problems are problems that have no practical solution because the data set involved is so large to defy a practical solution.
answer
Intractable
Unlock the answer
question
__________ use a "brute force" approach to solving a problem by trying every possibility and then picking the best solution.
answer
...
Unlock the answer
question
The __________ is a famous computation that computers cannot solve.
answer
Halting Problem
Unlock the answer
question
Computers don't understand __________, that is, the language humans use.
answer
natural language
Unlock the answer
question
A(n) __________ is a procedure that assigns a numerical value to each chess piece when calculating the best possible move.
answer
evaluation function
Unlock the answer
question
In chess or other games, looking ahead to future moves is describes as __________.
answer
game tree
Unlock the answer
question
Getting two or more computers to work on a problem at the same time is called __________.
answer
parallel computation
Unlock the answer
question
Increasing the number of CDs that need to be alphabetized would increase the size of the computation according to the __________ algorithm.
answer
work-proprotional to n2
Unlock the answer
question
The Face Forward algorithm is an example of the __________ algorithm.
answer
work-proportional to n
Unlock the answer
question
The fastest computers can calculate at rates of __________ instructions per second.
answer
200 million
Unlock the answer
question
A(n) __________ test attempts to define thinking.
answer
Turing
Unlock the answer
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New