Principles of Computing Final – Flashcards

Unlock all answers in this set

Unlock answers
question
Actual computer errors are very rare. t/f
answer
true
question
Computer memory is divided into bytes of 9 bits. t/f
answer
false
question
Every memory location in the computer is numbered, starting at 0. t/f
answer
true
question
Each byte in memory is limited in size. t/f
answer
true
question
A megabyte is exactly a million bytes. t/f
answer
false
question
The ADD instruction adds the contents of a location, not the number of the location. t/f
answer
true
question
The ability to store different values in its memory locations makes the computer a flexible tool. t/f
answer
true
question
Device drivers must be purchased separately from the peripheral. t/f
answer
false
question
Any 2 GHz computer will always run faster than a 1 GHz computer. t/f
answer
false
question
Starting a computer is called booting. t/f
answer
true
question
An interrupt is a request for the operating system to do something. t/f
answer
true
question
Miniaturization is the biggest achievement of microchip technology. t/f
answer
false
question
A canal is the path in a semiconductor where electricity travels. t/f
answer
false
question
A field effect transistor controls the flow of electricity through a circuit without ever touching the circuit. t/f
answer
true
question
The fear of computers taking over the world has died down since the 1950s and 1960s. t/f
answer
true
question
Memory is measured in: a) megabytes b) bytes c) MB d) all of the above
answer
d) all of the above
question
Computer memory is like: a) a rule b) a row of plastic cups c) a number line d) an analog clock
answer
b) a row of plastic cups
question
The control unit of the computer is involved in the: a) Instruction Fetch & Instruction Execute Cycle b) Control Cycle c) Instruction Execution d) Data Fetch
answer
a) Instruction Fetch & Instruction Execute Cycle
question
The peripheral most closely tied to the computer is the: a) monitor b) mouse c) hard disk d) keyboard
answer
c) hard disk
question
Computer instructions are: a) 1 byte long b) 2 bytes long c) 4 bytes long d) 8 bytes long
answer
c) 4 bytes long
question
The program counter keeps track of the: a) number of programs the computer is running b) number of memory addresses used c) next instruction in the Control unit d) current instruction in Fetch/Execute
answer
c) next instruction in the Control unit
question
The computer's speed is measured in megahertz, that is: a) thousands of cycles per minute b) millions of cycles per minute c) thousands of cycles per second d) millions of cycles per second
answer
d) millions of cycles per second
question
On the computer, a billion clock ticks in a second is called: a) megahertz b) gigahertz c) bilahertz d) terahertz
answer
b) gigahertz
question
Computer speed is dependent upon all of the following except: a) processor speed b) memory size c) byte size d) instruction set
answer
c) byte size
question
A clock speed of 1 GHz means the computer runs: a) exactly 1 billion instructions per second b) at least 1 billion instructions per second c) up to 1 billion instructions per second d) around 1 billion instructions per second
answer
d) around 1 billion instructions per second
question
A page fault is: a) an attempt by the computer to run instructions stored on the hard disk b) the process the computer uses to start itself c) an error the computer makes when a device driver is missing d) an out of memory error
answer
a) an attempt by the computer to run instructions stored on the hard disk
question
Which of the following is not controlled by the operating system? a) printing and mouse movement b) system integration c) monitor display d) memory management
answer
b) system integration
question
Integrated circuits are so remarkable because: a) they use a photographic process in manufacturing b) the entire circuit is made of the same types of materials c) they combine millions of programs on the same chip d) more than one of the above
answer
d) more than one of the above
question
The "wires" on a computer chip are made from: a) copper b) aluminum c) iron d) gold
answer
b) aluminum
question
The lowest programming language that humans use is: a) binary b) assembly c) Java d) HTML
answer
b) assembly
question
Which of the following is not an operating system? a) Apple Mac X b) Unix c) Linux d) Assembly
answer
d) Assembly
question
Management of a computer's hardware is done with: a) a programming language b) a compiler c) an operating system d) all of the above
answer
c) an operating system
question
How many steps are a part of the Fetch/Execute cycle? a) 2 b) 4 c) 5 d) 8
answer
c) 5
question
The next instruction must be at the memory address: a) PC b) PC + 4 c) PC-2 d) PC*4
answer
b) PC + 4
question
Information is generated when buying goods and services at a store. t/f
answer
true
question
The vast majority of business transactions are anonymous. t/f
answer
false
question
American privacy laws are much stricter than European laws. t/f
answer
false
question
The United States has not adopted the OECD principles. t/f
answer
true
question
Globalization is likely to increase privacy. t/f
answer
true
question
The laws protecting the information of individuals place more limits on the government than on business. t/f
answer
true
question
The United States provides almost no enforcement of OECD privacy principles. t/f
answer
true
question
A company can place a cookie on your computer even if you've never visited the Web site. t/f
answer
true
question
Linking third-party serial numbers embedded in cookies is illegal. t/f
answer
false
question
Cooking can be used to track ad placement on Web sites. t/f
answer
true
question
The biggest information privacy issue in the United States is the concern between approval and objection of information use. t/f
answer
true
question
The RSA public key cryptosystem code has not been cracked. t/f
answer
false
question
The Do-Not-Call List was so successful, it has now been applied to email. t/f
answer
false
question
Identity theft is the crime of posing as someone else for fraudulent purpose. t/f
answer
true
question
Partial bakcups should be made more often than full backups. t/f
answer
true
question
Emptying the trash is no guarantee that the data has been erased. t/f
answer
true
question
Privacy laws in Hong Kong are stricter than those in the United States. t/f
answer
true
question
There are only two basic threats to privacy. t/f
answer
true
question
Non-EU countries that want information on Eu citizens must show that they have privacy laws consistent with the OECD principles. t/f
answer
true
question
"Opt-in" means the business can use it unless the person explicitly prohibits the new use. t/f
answer
false
question
Modern browsers let you control the cookie policy for your computer. t/f
answer
true
question
In the United States the protection of an individual's privacy is the responsibility of the government. t/f
answer
false
question
The purpose of encryption is to allow private transmission and storage of sensitive information. t/f
answer
true
question
The frequency count of English is fixed. t/f
answer
false
question
Personal computers can only be backed up to another hard disk. t/f
answer
true
question
Most Americans wrongly assume that their privacy regarding business information is restricted to __________.
answer
private use
question
__________ and __________ are the two biggest threats to privacy.
answer
Government and Business
question
Five principles for the collection and use of personal information were first laid out by the __________.
answer
Code of Fair Information Practices
question
The __________ limits the government's ability to interfere with people's privacy.
answer
Privacy Act of 1974
question
The United states takes a __________ approach to individual privacy by passing laws to limit specific industries or business practices.
answer
sectoral
question
The concept of __________ allows data on people from EC countries to be transferred to other countries, providing the company complies with OECD rules.
answer
Safe Harbor
question
__________ is the process of recovering encrypted cipher text.
answer
Decryption
question
__________ can be described as x or y but not both.
answer
XOR
question
Public key encryption techniques are known as __________.
answer
strong encryption
question
A(n) __________ is a security bypass that could be used to send cleartext to security officials.
answer
trapdoor
question
__________ systems would bypass security by requiring software vendors to register their encryption keys.
answer
Key escrow
question
Which principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date?
answer
Quality Principle
question
A(n) __________ solution provides consistent protection to all information.
answer
Omnibus
question
FTC guidelines require __________ only for highly sensitive information like medical data.
answer
opt-in
question
__________ are an elegant way for servers to give clients the illusion they are the only one being served.
answer
Cookies
question
Spreadsheets are used primarily in: a) education b) business c) government d) the home
answer
c) government
question
The basic unit of a spreadsheet is a: a) box b) cube c) cell d) grid
answer
c) cell
question
Speadsheets: a) can only be sorted by column A b) can be sorted by any column provided the column is named c) are sorted by rows then columns d) can be sorted by any column
answer
d) can be sorted by any column
question
A range of cells can include: a) cells from more than one row b) cells from more than one column c) the entire spreadsheet d) all of the above
answer
d) all of the above
question
Data too wide to fit in a cell: a) is truncated b) is abbreviated c) is hyphenated d) cannot be entered into a cell
answer
a) is truncated
question
The main purpose of a spreadsheet is to: a) display numerical results b) process numerical data c) organize factual data d) graphically present data
answer
b) process numerical data
question
To stop editing a cell and move to another cell, use the: a) arrow key b) tab key c) Enter key d) escape key
answer
c) Enter key
question
Common, summary applications in a spreadsheet are handled by: a) formulas b) functions c) tables d) formatting
answer
b) functions
question
Spreadsheets have: a) over 50 build-in functions b) 76 built-in functions c) nearly 100 built-in functions d) over 100 built-in functions
answer
d) over 100 built-in functions
question
To get a cell to display $10.00 you must: a) enter 10.00 and format the cell to currency b) enter $10.00 in the cell c) enter $1&0 in the cell d) it cannot be done
answer
a) enter 10.00 and format the cell to currency
question
To select a range of cells: a) double-click the first and last cells b) drag the cursor across the cells c) click Select on the Edit menu d) click the Add icon
answer
b) drag the cursor across the cells
question
To clear cells using Excel, select: a) Edit>Clear>Cells b) Edit> Delete Cells c) Edit> Clear> All d) Edit> Delete Contents...
answer
c) Edit>Clear>All
question
A formula reference begins with: a) f() b) a cell reference c) any number d) the equal sign (=)
answer
d) the equal sign (=)
question
Spreadsheet columns are labeled with __________.
answer
letters
question
The rows of a spreadsheet are designated with __________.
answer
numbers
question
The __________ determines whether a spreadsheet cell contains a formula or data.
answer
equal sign
question
Spreadsheet formulas are edited in the __________.
answer
edit window
question
An absolute cell reference makes use of the __________ symbol in its formula.
answer
$
question
The process of copying from one cell to many others by simply dragging is called __________.
answer
filling
question
Control over the style of the display of a cell is called ___________.
answer
formatting
question
Cell references that do not change when copied from one cell to another are called __________ references.
answer
absolute
question
The Min function is used to display the __________ item in a list.
answer
smallest
question
A file with a .txt extension probably contains __________.
answer
text
question
To change the way contents of a cell appears, you change its __________.
answer
format
question
To help us create a list, spreadsheets give us an array of __________ that we fill in to set up our list.
answer
cells
question
Flexibility is an important characteristic of a spreadsheet. t/f
answer
false
question
Summary information should be placed at the top of a spreadsheet. t/f
answer
false
question
When working with a spreadsheet, use different fonts for headings and data. t/f
answer
true
question
Use the Edit menu to insert comments in Excel. t/f
answer
false
question
In a spreadsheet, conditional formatting allows to you specify a format for cells that meet certain criteria. t/f
answer
true
question
Excel provides automatic currency conversion with no need to write special formulas. t/f
answer
false
question
In a spreadsheet, names can only be applied to cell references, not individual cells.
answer
false
question
Direct changes to a spreadsheet's values are the best way to perform what if analysis.
answer
true
question
To run the actual filtering operation in a spreadsheet, select a cell in the column to be filtered.
answer
true
question
The first rule of setting up effective spreadsheets is: a) make if visually interesting b) focus on form c) avoid explanations that clutter the spreadsheet d) explain everything
answer
b) focus on form
question
Place descriptive information: a) on the top and left b) on the top and right c) on the bottom and left d) on the bottom and right
answer
a) on the top and left
question
In the Conditional Formatting dialog box, the default condition is: a) equal to b) less than c) greater than d) between
answer
d) between
question
What symbol is used to denote absolute cell references? a) equal sign (=) b) dollar sign ($) c) percent sign (%) d) tilde (~)
answer
b) dollar sign ($)
question
The IF function specifies: a) action on true outcome b) condition c) action of false outcome d) all of the above
answer
d) all of the above
question
To access letters of a cell value for such comparisons, use the function: a) LETTER() b) INDEX() c) IF() d) LEFT()
answer
d) LEFT()
question
A word or a phrase applied to a cell or range of cells is called its: a) value b) name c) literal d) range id
answer
b) name
question
The Scenario Manager window is accessed via the: a) Tools menu b) File menu c) Edit menu d) Formulas menu
answer
a) Tools menu
question
What method is used to access subsets of information? a) logging b) conditional formatting c) sorting d) filtering
answer
d) filtering
question
Inconsistency is the main reason to avoid redundancy of information in a database. t/f
answer
true
question
Relationships connect rows of one table with rows of another table. t/f
answer
true
question
Relationships are part of the metadata of a database. t/f
answer
true
question
Relationships are specified by the user of the database. t/f
answer
false
question
For two tables to be related, they must share a common field. t/f
answer
true
question
The shared field between two tables cannot be unique. t/f
answer
false
question
Access to sensitive information in a database should be limited. t/f
answer
true
question
Logical database duplicates information that exists in the tables of a physical database. t/f
answer
true
question
Queries are used to create views. t/f
answer
true
question
A logical table can be created with information from no more than two physical tables. t/f
answer
false
question
To successfully use a database, a user should know SQL.
answer
false
question
An instance of a database table is a table with a specific set of rows. t/f
answer
true
question
A root element is the tag that encloses all of the content of the XML file. t/f
answer
true
question
The key field for the student database on a campus is probably the student: a) address b) ID c) phone d) last name
answer
b) ID
question
A unique identifier stored in place of information that might be repeated is known as a: a) key field b) foreign key c) data key d) lookup key
answer
b) foreign key
question
A logical database: a) is created from existing information b) is created fresh each time it is needed c) usually uses information from multiple tables d) all of the above
answer
d) all of the above
question
Associating information from two or more tables is done with a: a) Join operation b) Bind operation c) Combine operation d) Unite operation
answer
a) Join operation
question
Logical tables are created with a: a) view b) query c) relationship d) key
answer
b) query
question
Queries are a part of the: a) logical database b) database schema c) metadata d) all of the above
answer
d) all of the above
question
In SQL, the INNER JOIN is used to combine: a) two or more logical tables to form a physical table b) two or more physical tables to form a logical tables c) tables in the same way the Product operation is used d) all of the above
answer
d) all of the above
question
The SQL WHERE clause is similar to the: a) Join operation b) Select operation c) Union operation d) Add operation
answer
...
question
Relationships in a database schema show how: a) tables are related to one another b) queries are related to one another c) information in a table is related to information in another table d) fields are related to one another in a table
answer
a) tables are related to one another
question
An ER diagram shows relationships between: a) tables in a database b) entities in a database c) fields in a database d) queries in a database
answer
b) entities in a database
question
A set of attributes for which all entities are different is known as a: a) primary key b) secondary key c) candidate key d) provisional key
answer
c) candidate key
question
XML should be edited using a: a) word processor b) text editor c) Web browser d) spreadsheet program
answer
b) text editor
question
XML tags may not contain: a) spaces b) uppercase letters c) lowercase letters d) numbers
answer
a) spaces
question
When Turing developed his test, researchers believed that "natural language" was beyond the abilities of computers. t/f
answer
true
question
Any computer using only very simple instructions can simulate any other computer. t/f
answer
true
question
When a computer plays chess, the information is represented in: a) natural language b) bits c) black and white d) integers
answer
b) bits
question
__________ computer problems are problems that have no practical solution because the data set involved is so large to defy a practical solution.
answer
Intractable
question
__________ use a "brute force" approach to solving a problem by trying every possibility and then picking the best solution.
answer
...
question
The __________ is a famous computation that computers cannot solve.
answer
Halting Problem
question
Computers don't understand __________, that is, the language humans use.
answer
natural language
question
A(n) __________ is a procedure that assigns a numerical value to each chess piece when calculating the best possible move.
answer
evaluation function
question
In chess or other games, looking ahead to future moves is describes as __________.
answer
game tree
question
Getting two or more computers to work on a problem at the same time is called __________.
answer
parallel computation
question
Increasing the number of CDs that need to be alphabetized would increase the size of the computation according to the __________ algorithm.
answer
work-proprotional to n2
question
The Face Forward algorithm is an example of the __________ algorithm.
answer
work-proportional to n
question
The fastest computers can calculate at rates of __________ instructions per second.
answer
200 million
question
A(n) __________ test attempts to define thinking.
answer
Turing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New