Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Midterm Comp.Sci

Midterm Computer Science (chapters and tests) 1-7

QuestionAnswer
Users of hypertext documents, called ____ in Web parlance, are free to navigate the collection of documents in whatever order they want, using links to move freely between them. pages
A set of independent computer systems interconnected by telecommunication links for the purpose of sharing information and resources is known as a computer ____. network
In a ____ network, there is a single central node that is connected to all other sites. star
The ____ is a massive database distributed over thousands of machines that, in total, contain the host name-to-IP address mappings for the more than 1 billion host computers on the Internet. DNS
The term ____ generally refers to any communication link with the transmission rate exceeding 256,000 bps. broadband
In an Ethernet LAN, users can tap into a shared cable at its nearest point using a device called a ____. transceiver
The philosophy behind the ____ model is that we use a network to share resources that are too widespread, too expensive, or used too infrequently to warrant replication at every node. client/server
Which of the following is not a layer in the TCP/IP protocol hierarchy? Standard Access Control
A ____ is a device that makes internetwork connections and provides routing between different WANs. gateway
____ has been the single most popular application of networks for the last 35 years. Email
The individual computers on a network are referred to as ____, and they can range in size from smartphones, tablets, and tiny laptops to massively parallel supercomputers. nodes
Which of the following is not an advantage of cloud computing? immune to any type of online attack
The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all platforms, and all content equally. net neutrality
Which of the following is not one of the three categories that cloud services typically fall into? facilities services
The ____ layer protocols are the rules for implementing end-user services provided by a network. Application
Both a user's individual computer and a company's private network are connected to the world through a(n) ____. ISP
The separation of a service from the entity (or entities) providing that service is called ____. virtualization
The ____ algorithm is the basis for all Data Link Control protocols that are currently used. ARQ
If a digital subscriber line is ____, it does not have the same transmission speed in the download direction as in the upload direction. asymmetric
In a ____, a user transmits from his or her computer, tablet, or smartphone to a local wireless base station that is no more than a few hundred feet away. WLAN
The set of services and resources created by the software and seen by the user is called a ____ machine. virtual
After an op code has been converted into binary, an assembler must perform a similar task on the ____ field. address
____ mark the beginning and end of an assembly language program, specifying where to start and stop the translation process. Pseudo-ops
Which of the following is not a problem with machine language? It allows only character-based memory addresses.
____ software is a collection of computer programs that manages the resources of the computer and facilitates access to those resources. System
____-generation systems developed the concept of user operation codes that could be included in any user program. Third
An assembler uses an op code table to translate ____ op codes to binary. mnemonic
____ are privileged users, usually computer center employees, with the ability to access and maintain password files. Superusers
Early batch operating systems were the first to include a(n) ____ language. command
The ____ keeps a list of programs ready to run on the processor, and it selects the one that will execute next. scheduler
Assembly languages allow the programmer to refer to op codes using a symbolic name, called the ____, rather than by a number. op code mnemonic
A ____ machine is essentially hardware bereft of any helpful user-oriented features. naked
Computers that are placed inside other pieces of equipment to control their operation are called ____ systems. embedded
____ commands are commands sent to the operating system to perform a service on the user's behalf. System
During the ____ generation of system software, there really were no operating systems and there was very little software support of any kind. first
It is the task of the ____ to read instructions from the object file and store them into memory for execution. loader
In a "true" multiprogrammed environment, the only event (other than termination) that causes a program to be ____ is the execution of a slow I/O operation. suspended
____ user interfaces interact with users and solicit requests in a variety of ways beyond point-and-click. Multimedia
An assembler translates a symbolic assembly language into ____ language. machine
A ____ is a network that is located in a geographically contiguous area such as a room, a building, or a campus. LAN
The branch of computer science that studies computers in terms of their major functional units is ____. computer organization
____ is the functional unit of a computer that stores and retrieves instructions and data. Memory
When two-dimensional memory locations are stored in row major order, each memory ____ is connected to two selection lines, the row selection line and the column selection line. cell
A disk stores information in units called ____, each of which contains an address and a data block with a fixed number of bytes. sectors
____ is the time needed to position the read/write head over the correct track. Seek time
The ____ is the subsystem that performs such mathematical and logical operations as addition, subtraction, and comparison for equality. ALU
A(n) ____ is like a special-purpose computer whose responsibility is to handle the details of input/output and to compensate for any speed differences between I/O devices and other parts of the computer. I/O controller
The ____ code field is a unique unsigned integer code assigned to each machine language operation recognized by the hardware. operation
The instructions that can be decoded and executed by the control unit of a computer are represented in ____. machine language
Which of the following is not a component that makes up the Von Neumann architecture? ACU
For the control unit to fetch and execute instructions, it relies on two special registers called the ____. PC and IR
Processors today have clock rates of about ____. 3-5 GHz
The best measure of speed for computers that execute scientific programs that do an enormous amount of floating-point arithmetic is ____. GFLOPS
Which of the following phases is not part of the Von Neumann cycle? encode
In ____ parallelism, a computer system has multiple, independent processors each with its own primary memory unit, and every processor is capable of executing its own separate program in its own private memory at its own rate. MIMD
In parallel processing, each of the processors tackles a small part of the overall problem and then communicates its result to the other processors via the ____ network. interconnection
The multiple processors within a ____ cluster do not have to be identical or to belong to a single administrative organization. MIMD
____ computing enables researchers to easily and transparently access computer facilities without regard for their location. Grid
The real key to using ____ parallel processors is to design solution methods that effectively utilize the large number of available processors. massively
____ computers are built using the principle called superposition, in which a single bit of data, now called a qubit, can be either a 0 or a 1 or both a 0 and a 1 simultaneously. Quantum
Together, ____ and multiplexer circuits enable us to build computer systems that execute the correct instructions using the correct data values. decoder
In a base-2 and a base-10 system, the value of a digit depends on its ____ within a number. specific position
A large number of transistors, as well as the electrical conducting paths that connect them, can be printed photographically on a wafer of silicon to produce a device known as a(n) ____ circuit. integrated
A(n) ____ transforms a set of (0, 1) input values into a single (0, 1) output value according to a specific transformation rule. gate
The area of mathematics that deals with the rules for manipulating the two logical values true and false, is called ____. Boolean logic
The function of a(n) ____ is to select exactly one of its 2N input lines and copy the binary value on that input line onto its single output line. multiplexer
Any unsigned value greater than the largest unsigned whole number that can be represented in the computer results in the error condition called ____ overflow. arithmetic
A(n) ____ is an electronic device that operates on a collection of binary inputs to produce a binary output. gate
Characters in the ASCII system are assigned to the integer values 0 to ____. 255
To convert a description of a circuit's desired behavior into a circuit diagram composed of AND, OR, and NOT gates, a circuit ____ algorithm is used. construction
____ is when the leftmost bit of a number is used to represent the sign while remaining bits are used to represent the magnitude of the value. sign/magnitude notation
A ____ compression scheme is one in which no information is lost in the compression, and it is possible to exactly reproduce the original data. lossless
____ circuits are used to determine the order in which operations are carried out and to select the correct data values to be processed. Control
A simple compression technique that can be used on almost any form of data is ____. run-length encoding
One popular compression technique uses ____ code sets, which are often used to compress text but can also be used with other forms of data. variable-length
A(n) ____ circuit is a collection of logic gates that transforms a set of binary inputs into a set of binary outputs and in which the values of the outputs depend only on the current values of the inputs. combinational
The most common format for storing color images is the ____ encoding scheme. RGB
To construct an OR gate, you start with two transistors, and they are connected in ____. parallel
The decimal-to-binary algorithm is based on successive divisions by ____. 2
The ____ is the total number of cycles per unit time measured in cycles/second. frequency
The study of the efficiency of algorithms is called the ____ of algorithms. analysis
The ____ algorithm does the same amount of work no matter how the numbers are initially arranged. selection sort
A ____ repeatedly compares a value being searched for against a value in an unordered list. This process continues until the desired value is found or the list is exhausted. sequential search
Given the data cleanup problem of removing 0 values from a data set, the ____ algorithm squeezes 0 values out of the list by copying each remaining data item in the list one cell to the left. shuffle-left
Given the data cleanup problem of removing 0 values from a data set, the ____ algorithm scans a list from left to right and copies every legitimate value into a new list that it creates. copy-over
When the registrar at your institution sorts students in a class by name, he or she is using the ____ algorithm. selection sort
Problems for which no known polynomial solution algorithm exists are sometimes approached via ____ algorithms. approximation
____ is the term to describe an algorithm's careful use of resources. Efficiency
An algorithm that does cn2 work for any constant c is order of magnitude ____. n^2
Which search algorithm works by halving the list of items to search? binary
Solvable problems for which no polynomially bounded algorithms exist are called ____. intractable
____ is the algorithmic equivalence of style. Elegance
The comparative timing of algorithms is called ____. benchmarking
Which of the following is NOT an extremely desirable attribute of an algorithm? abstraction
If there are n nodes in a graph, then a Hamiltonian circuit (if it exists) must have ____ links. n
a algorithm solves the problem of routing a email message along the shortest possible path through intermediate computers from your mail server to the destination mail server would examine all possible paths to the destination and it uses the shortest one exponential
Computers are often compared in terms of the number of ____ they can crank out. flops
Even if the largest number in the unsorted section of a list is already at the end of the unsorted section, the ____ algorithm will exchange this number with itself. selection sort
Sequential search is an order-n algorithm in the ____. average and worst case
The ____ search algorithm is more efficient than the ____ search algorithm but it works only when the search list is already sorted. binary, sequential
The concept of algorithm ____, is one in which you can observe an algorithm being executed and watch as data values are dynamically transformed into final results. animation
____ operations are instructions that a computing agent understands and is capable of executing without further explanation or simplification. Primitive
Another term for looping is ____. iteration
____ is a set of English language constructs designed to resemble statements in a programming language but that does not actually run on a computer. Pseudocode
If the condition in a do/while statement evaluates to false, the loop body is executed ____ time(s). one
A(n) ____ is a named storage location that can hold a value. variable
The sequential search technique might use a variable called a(n) ____ to search a list. index
The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____. matching
With a random collection of names, the most effective method of searching for a specific name is with a ____ search. sequential
We speak and write ____ language in our everyday lives. natural
A ____ algorithm executes its instructions in a straight line from top to bottom and then stops. sequential
Which of the following is NOT true of natural language? It is well-suited for algorithm design.
Algorithm ____ is the most challenging and creative part of the problem-solving process. discovery
A ____ is a collection of useful, prewritten algorithms. library
The ____ statement allows you to select exactly one of two alternatives—this or that. if/then/else
When an algorithm reaches a(n) ____ operation, it waits until someone or something provides it with a value. input
If we need to do the same computation 1 million times, the power of the computer to ____, that is, to repetitively execute a block of statements, becomes quite apparent. loop
The true/false condition is called the ____ condition. continuation
Charles Babbage gave up on his second ____________________ because the current technology could not support his project. Difference Engine
Can all conceivable problems can be solved algorithmically? T or F False
In 1672, a French philosopher and mathematician designed and built one of the first mechanical calculators named the ____ that could do addition and subtraction. Pascaline
In computer science, it is not simply the construction of a high-quality __________ that is important but also the methods it embodies. program
Mechanical devices for performing complex calculations existed prior to the twentieth century. T or F True
Algorithms are exclusive to the field of computer science. T or F False
John Von Neumann's stored program computer lay the groundwork for modern-day computing by allowing the computer to store instructions in ____ alongside the data. binary values
The evolution of computer science began before the development of the first computer system. T or F True
The ____ was the first fully electronic, general-purpose, programmable computer. ENIAC
The ____ revolution enabled us to implement algorithms that automated the drudgery of repetitive mental tasks. computer
Created by: EmilyPipp
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards