click below
click below
Normal Size Small Size show me how
Midterm Comp.Sci
Midterm Computer Science (chapters and tests) 1-7
| Question | Answer |
|---|---|
| Users of hypertext documents, called ____ in Web parlance, are free to navigate the collection of documents in whatever order they want, using links to move freely between them. | pages |
| A set of independent computer systems interconnected by telecommunication links for the purpose of sharing information and resources is known as a computer ____. | network |
| In a ____ network, there is a single central node that is connected to all other sites. | star |
| The ____ is a massive database distributed over thousands of machines that, in total, contain the host name-to-IP address mappings for the more than 1 billion host computers on the Internet. | DNS |
| The term ____ generally refers to any communication link with the transmission rate exceeding 256,000 bps. | broadband |
| In an Ethernet LAN, users can tap into a shared cable at its nearest point using a device called a ____. | transceiver |
| The philosophy behind the ____ model is that we use a network to share resources that are too widespread, too expensive, or used too infrequently to warrant replication at every node. | client/server |
| Which of the following is not a layer in the TCP/IP protocol hierarchy? | Standard Access Control |
| A ____ is a device that makes internetwork connections and provides routing between different WANs. | gateway |
| ____ has been the single most popular application of networks for the last 35 years. | |
| The individual computers on a network are referred to as ____, and they can range in size from smartphones, tablets, and tiny laptops to massively parallel supercomputers. | nodes |
| Which of the following is not an advantage of cloud computing? | immune to any type of online attack |
| The term ____ means that a public information network such as an Internet service provider (ISP) should treat all users, all platforms, and all content equally. | net neutrality |
| Which of the following is not one of the three categories that cloud services typically fall into? | facilities services |
| The ____ layer protocols are the rules for implementing end-user services provided by a network. | Application |
| Both a user's individual computer and a company's private network are connected to the world through a(n) ____. | ISP |
| The separation of a service from the entity (or entities) providing that service is called ____. | virtualization |
| The ____ algorithm is the basis for all Data Link Control protocols that are currently used. | ARQ |
| If a digital subscriber line is ____, it does not have the same transmission speed in the download direction as in the upload direction. | asymmetric |
| In a ____, a user transmits from his or her computer, tablet, or smartphone to a local wireless base station that is no more than a few hundred feet away. | WLAN |
| The set of services and resources created by the software and seen by the user is called a ____ machine. | virtual |
| After an op code has been converted into binary, an assembler must perform a similar task on the ____ field. | address |
| ____ mark the beginning and end of an assembly language program, specifying where to start and stop the translation process. | Pseudo-ops |
| Which of the following is not a problem with machine language? | It allows only character-based memory addresses. |
| ____ software is a collection of computer programs that manages the resources of the computer and facilitates access to those resources. | System |
| ____-generation systems developed the concept of user operation codes that could be included in any user program. | Third |
| An assembler uses an op code table to translate ____ op codes to binary. | mnemonic |
| ____ are privileged users, usually computer center employees, with the ability to access and maintain password files. | Superusers |
| Early batch operating systems were the first to include a(n) ____ language. | command |
| The ____ keeps a list of programs ready to run on the processor, and it selects the one that will execute next. | scheduler |
| Assembly languages allow the programmer to refer to op codes using a symbolic name, called the ____, rather than by a number. | op code mnemonic |
| A ____ machine is essentially hardware bereft of any helpful user-oriented features. | naked |
| Computers that are placed inside other pieces of equipment to control their operation are called ____ systems. | embedded |
| ____ commands are commands sent to the operating system to perform a service on the user's behalf. | System |
| During the ____ generation of system software, there really were no operating systems and there was very little software support of any kind. | first |
| It is the task of the ____ to read instructions from the object file and store them into memory for execution. | loader |
| In a "true" multiprogrammed environment, the only event (other than termination) that causes a program to be ____ is the execution of a slow I/O operation. | suspended |
| ____ user interfaces interact with users and solicit requests in a variety of ways beyond point-and-click. | Multimedia |
| An assembler translates a symbolic assembly language into ____ language. | machine |
| A ____ is a network that is located in a geographically contiguous area such as a room, a building, or a campus. | LAN |
| The branch of computer science that studies computers in terms of their major functional units is ____. | computer organization |
| ____ is the functional unit of a computer that stores and retrieves instructions and data. | Memory |
| When two-dimensional memory locations are stored in row major order, each memory ____ is connected to two selection lines, the row selection line and the column selection line. | cell |
| A disk stores information in units called ____, each of which contains an address and a data block with a fixed number of bytes. | sectors |
| ____ is the time needed to position the read/write head over the correct track. | Seek time |
| The ____ is the subsystem that performs such mathematical and logical operations as addition, subtraction, and comparison for equality. | ALU |
| A(n) ____ is like a special-purpose computer whose responsibility is to handle the details of input/output and to compensate for any speed differences between I/O devices and other parts of the computer. | I/O controller |
| The ____ code field is a unique unsigned integer code assigned to each machine language operation recognized by the hardware. | operation |
| The instructions that can be decoded and executed by the control unit of a computer are represented in ____. | machine language |
| Which of the following is not a component that makes up the Von Neumann architecture? | ACU |
| For the control unit to fetch and execute instructions, it relies on two special registers called the ____. | PC and IR |
| Processors today have clock rates of about ____. | 3-5 GHz |
| The best measure of speed for computers that execute scientific programs that do an enormous amount of floating-point arithmetic is ____. | GFLOPS |
| Which of the following phases is not part of the Von Neumann cycle? | encode |
| In ____ parallelism, a computer system has multiple, independent processors each with its own primary memory unit, and every processor is capable of executing its own separate program in its own private memory at its own rate. | MIMD |
| In parallel processing, each of the processors tackles a small part of the overall problem and then communicates its result to the other processors via the ____ network. | interconnection |
| The multiple processors within a ____ cluster do not have to be identical or to belong to a single administrative organization. | MIMD |
| ____ computing enables researchers to easily and transparently access computer facilities without regard for their location. | Grid |
| The real key to using ____ parallel processors is to design solution methods that effectively utilize the large number of available processors. | massively |
| ____ computers are built using the principle called superposition, in which a single bit of data, now called a qubit, can be either a 0 or a 1 or both a 0 and a 1 simultaneously. | Quantum |
| Together, ____ and multiplexer circuits enable us to build computer systems that execute the correct instructions using the correct data values. | decoder |
| In a base-2 and a base-10 system, the value of a digit depends on its ____ within a number. | specific position |
| A large number of transistors, as well as the electrical conducting paths that connect them, can be printed photographically on a wafer of silicon to produce a device known as a(n) ____ circuit. | integrated |
| A(n) ____ transforms a set of (0, 1) input values into a single (0, 1) output value according to a specific transformation rule. | gate |
| The area of mathematics that deals with the rules for manipulating the two logical values true and false, is called ____. | Boolean logic |
| The function of a(n) ____ is to select exactly one of its 2N input lines and copy the binary value on that input line onto its single output line. | multiplexer |
| Any unsigned value greater than the largest unsigned whole number that can be represented in the computer results in the error condition called ____ overflow. | arithmetic |
| A(n) ____ is an electronic device that operates on a collection of binary inputs to produce a binary output. | gate |
| Characters in the ASCII system are assigned to the integer values 0 to ____. | 255 |
| To convert a description of a circuit's desired behavior into a circuit diagram composed of AND, OR, and NOT gates, a circuit ____ algorithm is used. | construction |
| ____ is when the leftmost bit of a number is used to represent the sign while remaining bits are used to represent the magnitude of the value. | sign/magnitude notation |
| A ____ compression scheme is one in which no information is lost in the compression, and it is possible to exactly reproduce the original data. | lossless |
| ____ circuits are used to determine the order in which operations are carried out and to select the correct data values to be processed. | Control |
| A simple compression technique that can be used on almost any form of data is ____. | run-length encoding |
| One popular compression technique uses ____ code sets, which are often used to compress text but can also be used with other forms of data. | variable-length |
| A(n) ____ circuit is a collection of logic gates that transforms a set of binary inputs into a set of binary outputs and in which the values of the outputs depend only on the current values of the inputs. | combinational |
| The most common format for storing color images is the ____ encoding scheme. | RGB |
| To construct an OR gate, you start with two transistors, and they are connected in ____. | parallel |
| The decimal-to-binary algorithm is based on successive divisions by ____. | 2 |
| The ____ is the total number of cycles per unit time measured in cycles/second. | frequency |
| The study of the efficiency of algorithms is called the ____ of algorithms. | analysis |
| The ____ algorithm does the same amount of work no matter how the numbers are initially arranged. | selection sort |
| A ____ repeatedly compares a value being searched for against a value in an unordered list. This process continues until the desired value is found or the list is exhausted. | sequential search |
| Given the data cleanup problem of removing 0 values from a data set, the ____ algorithm squeezes 0 values out of the list by copying each remaining data item in the list one cell to the left. | shuffle-left |
| Given the data cleanup problem of removing 0 values from a data set, the ____ algorithm scans a list from left to right and copies every legitimate value into a new list that it creates. | copy-over |
| When the registrar at your institution sorts students in a class by name, he or she is using the ____ algorithm. | selection sort |
| Problems for which no known polynomial solution algorithm exists are sometimes approached via ____ algorithms. | approximation |
| ____ is the term to describe an algorithm's careful use of resources. | Efficiency |
| An algorithm that does cn2 work for any constant c is order of magnitude ____. | n^2 |
| Which search algorithm works by halving the list of items to search? | binary |
| Solvable problems for which no polynomially bounded algorithms exist are called ____. | intractable |
| ____ is the algorithmic equivalence of style. | Elegance |
| The comparative timing of algorithms is called ____. | benchmarking |
| Which of the following is NOT an extremely desirable attribute of an algorithm? | abstraction |
| If there are n nodes in a graph, then a Hamiltonian circuit (if it exists) must have ____ links. | n |
| a algorithm solves the problem of routing a email message along the shortest possible path through intermediate computers from your mail server to the destination mail server would examine all possible paths to the destination and it uses the shortest one | exponential |
| Computers are often compared in terms of the number of ____ they can crank out. | flops |
| Even if the largest number in the unsorted section of a list is already at the end of the unsorted section, the ____ algorithm will exchange this number with itself. | selection sort |
| Sequential search is an order-n algorithm in the ____. | average and worst case |
| The ____ search algorithm is more efficient than the ____ search algorithm but it works only when the search list is already sorted. | binary, sequential |
| The concept of algorithm ____, is one in which you can observe an algorithm being executed and watch as data values are dynamically transformed into final results. | animation |
| ____ operations are instructions that a computing agent understands and is capable of executing without further explanation or simplification. | Primitive |
| Another term for looping is ____. | iteration |
| ____ is a set of English language constructs designed to resemble statements in a programming language but that does not actually run on a computer. | Pseudocode |
| If the condition in a do/while statement evaluates to false, the loop body is executed ____ time(s). | one |
| A(n) ____ is a named storage location that can hold a value. | variable |
| The sequential search technique might use a variable called a(n) ____ to search a list. | index |
| The process of searching for a special pattern of symbols within a larger collection of information is called pattern ____. | matching |
| With a random collection of names, the most effective method of searching for a specific name is with a ____ search. | sequential |
| We speak and write ____ language in our everyday lives. | natural |
| A ____ algorithm executes its instructions in a straight line from top to bottom and then stops. | sequential |
| Which of the following is NOT true of natural language? | It is well-suited for algorithm design. |
| Algorithm ____ is the most challenging and creative part of the problem-solving process. | discovery |
| A ____ is a collection of useful, prewritten algorithms. | library |
| The ____ statement allows you to select exactly one of two alternatives—this or that. | if/then/else |
| When an algorithm reaches a(n) ____ operation, it waits until someone or something provides it with a value. | input |
| If we need to do the same computation 1 million times, the power of the computer to ____, that is, to repetitively execute a block of statements, becomes quite apparent. | loop |
| The true/false condition is called the ____ condition. | continuation |
| Charles Babbage gave up on his second ____________________ because the current technology could not support his project. | Difference Engine |
| Can all conceivable problems can be solved algorithmically? T or F | False |
| In 1672, a French philosopher and mathematician designed and built one of the first mechanical calculators named the ____ that could do addition and subtraction. | Pascaline |
| In computer science, it is not simply the construction of a high-quality __________ that is important but also the methods it embodies. | program |
| Mechanical devices for performing complex calculations existed prior to the twentieth century. T or F | True |
| Algorithms are exclusive to the field of computer science. T or F | False |
| John Von Neumann's stored program computer lay the groundwork for modern-day computing by allowing the computer to store instructions in ____ alongside the data. | binary values |
| The evolution of computer science began before the development of the first computer system. T or F | True |
| The ____ was the first fully electronic, general-purpose, programmable computer. | ENIAC |
| The ____ revolution enabled us to implement algorithms that automated the drudgery of repetitive mental tasks. | computer |