# Computers Are Your Future 12th Edition by LaBerta – Test Bank

\$30.00

## Description

###### Computers Are Your Future 12th Edition by LaBerta – Test Bank

Computers Are Your Future, 12e (LaBerta)

Chapter 2  Inside the System Unit

1) A byte:

1. A) is the equivalent of eight binary digits.
2. B) represents one digit in the decimal numbering system.
3. C) is the smallest unit of information that a computer can process.
4. D) can be compared to the state of one light switch being either on or off.

Diff: 2

Reference:  Representing Data as Bits and Bytes

2) Computers count with ________ numbers.

1. A) regular
2. B) binary
3. C) decimal
4. D) digital

Diff: 2

Reference:  Representing Data as Bits and Bytes

3) Of the following, which represents the largest amount of data?

1. A) Terabyte
2. B) Megabyte
3. C) Petabyte
4. D) Kilobyte

Diff: 2

Reference:  Representing Data as Bits and Bytes

4) Approximately how much text is stored in a gigabyte?

1. A) 1 page
2. B) 1,000 pages
3. C) 1 book
4. D) 1,000 books

Diff: 3

Reference:  Representing Data as Bits and Bytes

5) A yottabyte represents 1 ________ bytes.

1. A) septillion
2. B) million
4. D) trillion

Diff: 3

Reference:  Representing Data as Bits and Bytes

6) Five bits result in ________ possibilities.

1. A) 5
2. B) 20
3. C) 26
4. D) 32

Diff: 3

Reference:  Representing Data as Bits and Bytes

7) Comparing a binary digit to a ________ is an easy-to-understand analogy.

1. A) highway
2. B) light switch
3. C) storage bin
4. D) memory chip

Diff: 3

Reference:  Representing Data as Bits and Bytes

8) The hexadecimal representation for the decimal 10 is:

1. A) 10.
2. B) B.
3. C) 15.
4. D) A.

Diff: 3

Reference:  Representing Data as Bits and Bytes

9) Hexadecimal numbers are represented using numbers 0 to 9 and letters ________.

1. A) A to F
2. B) A to Z
3. C) A to D
4. D) None of the above

Diff: 3

Reference:  Representing Data as Bits and Bytes

10) A ________ is the smallest unit of information that a computer can work with.

1. A) byte
2. B) bit
3. C) register
4. D) hex

Diff: 2

Reference:  Representing Data as Bits and Bytes

11) Floating-point notation:

1. A) has no advantage if used with numbers containing fractional points.
2. B) uses no fixed number of digits before or after the decimal point.
3. C) requires newer computers to have a special chip called a math coprocessor.
4. D) allows the computer to work with very large, but not very small, numbers.

Diff: 2

Reference:  Representing Very Large and Very Small Numbers

12) All of the following are examples of character codes EXCEPT:

1. A) SCSI.
2. B) ASCII.
3. C) EDCDIC.
4. D) Unicode.

Diff: 2

Reference:  Representing Characters: Character Code

13) An algorithm used as a bridge between binary code and keyboard characters is known as:

1. A) cache.
2. B) hot swapping.
3. C) data dependency.
4. D) character code.

Diff: 2

Reference:  Representing Characters: Character Code

14) ________ is becoming more popular than previously used character codes due to its ability to represent most, if not all, of the world’s languages.

1. A) Extended ASCII
2. B) ASCII
3. C) Unicode
4. D) EDCDIC

Diff: 2

Reference:  Representing Characters: Character Code

15) The most widely used character code is:

1. A) EBCDIC.
2. B) HTML.
3. C) ASCII.
4. D) Unicode.

Diff: 2

Reference:  Representing Characters: Character Code

16) The ________ contains a computer’s main hardware components.

1. A) motherboard
2. B) system unit
3. C) CPU
4. D) master case

Diff: 1

Reference:  Introducing the System Unit

17) Which of the following components would NOT be found inside the system unit?

1. A) Motherboard
2. B) USB port
3. C) Power supply
4. D) Cooling fan

Diff: 1

Reference:  Inside the System Unit

18) In the strictest sense of the term, the ________ contains the CPU.

1. A) system unit
2. B) unit frame
3. C) motherboard
4. D) computing platform

Diff: 1

Reference:  Inside the System Unit

19) Which of the following would NOT be found on the motherboard?

1. A) Microprocessor
2. B) System clock
3. C) Drive bays
4. D) Input/output buses

Diff: 2

Reference:  What’s on the Motherboard?

20) The central processing unit (CPU):

1. A) plays a minimal role in processing data.
2. B) is different from a microprocessor.
3. C) is a fairly simple device.
4. D) is an integrated chip capable of processing signals.

Diff: 1

Reference:  The CPU: The Microprocessor

21) A processor’s instruction set:

1. A) is unique to the type of processor.
2. B) is the same for different types of processors.
3. C) will run programs that were created for an incompatible processor.
4. D) has nothing to do with the ability of the computer to run a program.

Diff: 2

Reference:  The Instruction Set

22) The four-step process of fetch, decode, execute, and store is called a(n):

1. A) arithmetic operation.
2. B) machine cycle.
3. C) instruction cycle.
4. D) logical operation.

Diff: 1

Reference:  Microprocessor Performance

23) Which of the following subcomponents of the CPU takes instructions from memory and decodes the instructions?

1. A) Arithmetic-logic unit
2. B) Microprocessor
3. C) Data bus
4. D) Control unit

Diff: 2

Reference:  Microprocessor Performance

24) Which of the following is NOT one of the steps in the machine cycle?

1. A) Pipeline
2. B) Decode
3. C) Execute
4. D) Store

Diff: 2

Reference:  Microprocessor Performance

25) The greater the number of ________ on a microprocessor, and proximity to each other, the faster the processing speed.

1. A) transistors
2. B) disks
3. C) buses
4. D) registers

Diff: 2

Reference:  Microprocessor Performance

26) Which of the following operating systems was the first to use the 64-bit technology?

1. A) Mac OS X
2. B) Linux
3. C) MS-DOS
4. D) Windows XP

Diff: 3

Reference:  Data Bus Width and Word Size

27) A CPU’s word size is important because it determines which ________ the CPU can use.

1. A) application software
2. B) input devices
3. C) disk storage
4. D) operating system

Diff: 3

Reference:  Data Bus Width and Word Size

28) The number of operations per clock tick affects:

1. A) microprocessor performance.
2. B) monitor resolution.
3. C) disk drive capacity.
4. D) the bus size.

Diff: 1

Reference:  Operations per Cycle

29) A technique that uses more than one processor to execute a program is called:

1. A) parallel processing.
2. B) serial processing.
3. C) co-processing.
4. D) megaprocessing.

Diff: 1

Reference:  Parallel Processing

30) Which of the following input/output buses is used by today’s PCs?

1. A) PCI
2. B) CPU
3. C) L2
4. D) AGP

Diff: 2

Reference:  The Chipset and the Input/Output Bus

31) RAM stands for:

1. A) rapidly accessed memory.
2. B) random access memory.
3. C) reliable associated memory.
4. D) repeated auxiliary memory.

Diff: 1

Reference:  RAM

32) Each memory address is stored in ________ form.

1. A) serial
2. B) compressed
3. C) parallel
4. D) binary

Diff: 1

Reference:  RAM

33) Although introduced in 1995, the USB didn’t become widely used until the release of the:

1. A) Blackberry.
2. B) iMac.
3. C) iPod.
4. D) iTunes.

Diff: 3

Reference:  USB Ports

34) A memory ________ is the amount of RAM a program uses when it is operational.

1. A) stash
2. B) footprint
3. C) cache
4. D) utility

Diff: 1

Reference:  RAM

35) Which of the following types of memory has L1, L2, and L3 levels of storage?

1. A) RAM
2. B) ROM
3. C) cache
4. D) flash

Diff: 1

Reference:  Cache Memory

36) How many peripheral devices can be connected to a single USB port?

1. A) 1
2. B) 8
3. C) 64
4. D) 127

Diff: 3

Reference:  USB Ports

37) On non-Apple systems, the FireWire port is called a ________ port.

1. A) 1439
2. B) 2008
3. C) 1995
4. D) 1394

Diff: 2

Reference:  1394 Ports (FireWire)

38) The ExpressCard is also known as the ________ card.

1. A) SCSI
2. B) PCMCIA
3. C) PS/2
4. D) VGA

Diff: 1

39) The ExpressCard provides enhancements in all of the following areas EXCEPT:

1. A) wireless communication.
3. C) multimedia.
4. D) cost.

Diff: 1

40) If your computer doesn’t have enough USB ports, it is possible to obtain a USB ________.

1. A) hub
2. B) router
3. C) PBX
4. D) multiplexer

Diff: 3

Reference:  USB Ports

41) ________ numbers consist of only two digits.

Diff: 1

Reference:  Representing Data as Bits and Bytes

42) A(n) ________, also known as a PB, is equivalent to a quadrillion bytes.

Diff: 1

Reference:  Representing Data as Bits and Bytes

43) ________-point notation is used to represent exceedingly large or exceedingly small numbers as well as numbers with fractional parts.

Diff: 2

Reference:  Representing Very Large and Very Small Numbers

44) A(n) ________ is the smallest piece of information with which a computer can work.

Diff: 1

Reference:  Representing Data as Bits and Bytes

45) The American ________ Code for Information Interchange (ASCII) character code is most widely used on minicomputers, personal computers, and computers that make information available on the Internet.

Diff: 2

Reference:  Representing Characters: Character Code

46) The amount of room that a system unit needs to fit on the desk is called the ________.

Diff: 1

Reference:  Introducing the System Unit

47) The arrangement of internal components within the system unit is called the ________ factor.

Diff: 2

Reference:  Introducing the System Unit

48) The ________ is the large printed circuit board that holds the computer’s important components such as the microprocessor.

Diff: 1

Reference:  What’s on the Motherboard?

49) Calculations and comparisons are performed in the ALU, also known as the ________-logic unit.

Diff: 2

Reference:  Microprocessor Performance

50) A machine cycle includes the instruction cycle and the ________ cycle.

Diff: 1

Reference:  Data Bus Width and Word Size

51) The maximum number of bits processed by the CPU is called its ________ size.

Diff: 1

Reference:  Data Bus Width and Word Size

52) Superscalar architecture takes advantage of ________ to perform more than one instruction per clock tick.

Diff: 2

Reference:  Operations per Cycle

53) A collection of chips that are designed to move data between the microprocessor and the rest of the computer is called the ________.

Diff: 2

Reference:  The Chipset and the Input/Output Bus

54) A computer uses ________ memory when the RAM gets full.

Diff: 3

Reference:  RAM

55) Memory that the processor can use to store frequently accessed program instructions and data to improve the overall speed of the computer is called ________ memory.

Diff: 1

Reference:  Cache Memory

56) ________ or L1 cache memory is located in the microprocessor chip.

Diff: 1

Reference:  Cache Memory

57) The official name for Apple FireWire or Sony i.Link ports is an IEEE ________ port.

Diff: 2

Reference:  1394 Ports (FireWire)

58) Being able to connect and disconnect peripheral devices without having to shut the computer down is called ________ swapping.

Diff: 2

Reference:  USB Ports

59) A(n) ________ is an electronic switch that directs the flow of electrical signals in a computer.

Diff: 2

Reference:  What’s on the Motherboard?

60) ________ is older technology, device, or application that is being phased out in favor of advance in new technology.

Diff: 2

61) The Core i7 Extreme Edition microprocessor has a clock speed of ________.

Diff: 2

Reference:  Popular Microprocessors

62) Heat is removed from the CPU by using heat sink or ________.

Diff: 1

Reference:  Processor Slots and Sockets

63) An integrated circuit contains millions of ________.

Diff: 2

Reference:  What’s on the Motherboard?

64) The ________ step in the machine cycle interprets what action the program is telling the computer to perform.

Diff: 1

Reference:  Microprocessor Performance

65) The maximum number of bits processed by the CPU is called its ________ size.

Diff: 1

Reference:  Data Bus Width and Word Size

66) The newest standard for the PC card, mostly used in notebooks, is called the ExpressCard.

Diff: 2

67) Biometric authentication is individualized and cannot be fooled.

Diff: 2

Reference:  Introducing the System Unit

68) A byte is the smallest unit of information.

Diff: 2

Reference:  Representing Data as Bits and Bytes

69) Hexadecimal numbers use the numbers 0 to 9 and the letters A to F.

Diff: 2

Reference:  Representing Data as Bits and Bytes

70) Hexadecimal uses base 16 characters.

Diff: 2

Reference:  Representing Data as Bits and Bytes

71) The form factor is a specification for how internal components are mounted in the system unit.

Diff: 2

Reference:  Introducing the System Unit

72) The motherboard contains the CPU.

Diff: 1

Reference:  Inside the System Unit

73) A heat sink keeps the system unit cool.

Diff: 2

Reference:  Processor Slots and Sockets

74) Intel is the only producer of PC chips.

Diff: 2

Reference:  The Instruction Set

75) A memory address is stored in binary form.

Diff: 2

Reference:  RAM

76) PROM requires a special device to write instructions on a blank chip one time only.

Diff: 2

Reference:  ROM

77) EPROM can only be rewritten twice.

Diff: 2

Reference:  ROM

78) Keeping secondary cache as close as possible to the processor improves performance.

Diff: 2

Reference:  Cache Memory

79) The drive activity light tells you when the hard drive is accessing data.

Diff: 2

Reference:  The Front Panel

80) USB stands for Universal Serial Bus.

Diff: 1

Reference:  USB Ports

81) Computer manufacturers are increasing numbers of USB ports because of their convenience and versatility.

Diff: 2

Reference:  USB Ports

82) Additional circuit boards are installed at expansion slots.

Diff: 2

Reference:  Inside the System Unit

83)  The system unit houses the computer’s peripheral hardware components.

Diff: 2

Reference:  Introducing the System Unit

84) If a program is compatible, it is said to be a native application for a given processor design.

Diff: 2

Reference:  The Instruction Set

85) There are five steps of the machine cycle.

Diff: 1

Reference:  The Machine Cycle

86) The instruction cycle includes decode and execute.

Diff: 2

Reference:  The Machine Cycle

87) DDR2-SDRAM and DDR3-SDRAM need to have a constant power supply to avoid losing their contents.

Diff: 2

Reference:  RAM

88) A machine cycle includes the instruction cycle and the execution cycle.

Diff: 1

Reference:  Data Bus Width and Word Size

89) The execute step in the machine cycle interprets what action the program is telling the computer to perform.

Diff: 1

Reference:  Microprocessor Performance

90) The bus used for video and graphics displays is known as the AGP or Accelerated Graphics Port.

Diff: 1

Reference:  The Chipset and the Input/Output Bus

Match the following terms to their descriptions:

1. A) The number system used by computers
2. B) Most widely used character code
3. C) Uses base 16 characters to represent binary numbers
4. D) A character coding method created by IBM and used on its mainframes
5. E) One quintillion bytes

91) ASCII

Diff: 3

Reference:  Representing Characters: Character Code

92) Binary

Diff: 3

Reference:  Representing Data as Bits and Bytes

93) EBCDIC

Diff: 3

Reference:  Representing Characters: Character Code

Diff: 3

Reference:  Representing Data as Bits and Bytes

95) Exabyte

Diff: 3

Reference:  Representing Data as Bits and Bytes

Answers: 91) B 92) A 93) D 94) C 95) E

Match the following terms to their meanings:

1. A) The amount of space taken up by the case on the desk
2. B) Any size of case that contains the computer’s main hardware
3. C) Specification for mounting internal components such as the motherboard
4. D) Performs a specific action such as adding two numbers
5. E) Prevents computer components from being damaged by heat

96) System unit

Diff: 2

Reference:  Introducing the System Unit

97) Footprint

Diff: 2

Reference:  Introducing the System Unit

98) Form factor

Diff: 2

Reference:  Introducing the System Unit

99) Cooling fan

Diff: 2

Reference:  Inside the System Unit

100) Execute

Diff: 1

Reference:  Microprocessor Performance

Answers: 96) B 97) A 98) C 99) E 100) D

Computers Are Your Future, 12e (LaBerta)

Chapter 4  System Software

1) ________ includes all the programs that provide the infrastructure and hardware control needed for a computer, its peripheral devices, and other programs to function smoothly.

1. A) Application software
2. B) Open source software
3. C) Network software
4. D) System software

Diff: 2

Reference:  Chapter Introduction

2) The set of programs designed to manage the resources of a computer is the:

1. A) resource manager.
2. B) operating system.
3. C) boot strap set.
4. D) utility set.

Diff: 2

Reference:  The Operating System

3) Like a traffic officer, the computer’s OS works at the intersection of:

1. A) application software, the user, and the computer’s hardware.
2. B) application software and the user.
3. C) application software and the computer’s hardware.
4. D) the user and the computer’s hardware.

Diff: 2

Reference:  The Operating System

4) The process of loading the OS to memory is which of the following?

1. A) Configuration
2. B) Booting
3. C) Authentication
4. D) Installing

Diff: 2

Reference:  Starting the Computer

5) Starting a computer that is not already turned on is called a:

1. A) warm boot.
3. C) cold boot.

Diff: 1

Reference:  Starting the Computer

6) Starting a computer that is already turned on is called a:

1. A) warm boot.
2. B) cold boot.
4. D) power on.

Diff: 1

Reference:  Starting the Computer

7) Which of the following is the correct sequence for what happens when you turn on a computer?

Diff: 3

Reference:  Starting the Computer

8) One way to initiate a warm boot in Windows Vista and Windows 7 is to press which of the following keys?

1. A) Ctrl + Boot
2. B) Ctrl + Alt + Ins
3. C) Ctrl + Alt + Del
4. D) Restart

Diff: 1

Reference:  Starting the Computer

9) The ________ is the central part of the OS that consists of actions the OS uses most frequently, such as starting applications.

1. A) kernel
2. B) core module
3. C) critical data set
4. D) BIOS

Diff: 3

Reference:  Starting the Computer

10) The first OS function is:

1. A) scanning the hard disk for errors.
3. C) starting the computer.
4. D) prompting the user for an ID and password.

Diff: 1

Reference:  Starting the Computer

11) Which of the following is true about RAM?

1. A) It is located on the motherboard.
2. B) It holds all programs in use.
3. C) It holds documents in progress.
4. D) All of the above.

Diff: 2

Reference:  Starting the Computer

12) The BIOS:

1. A) is temporarily written in the computer’s
2. B) is permanently written in the computer’s RAM.
3. C) equips the computer with the instructions needed to accept keyboard input and display information on the screen.
4. D) displays input and output information on a graphical screen.

Diff: 3

Reference:  Step 1: The BIOS and Setup Program

13) While the BIOS information is visible, you can press a special key, such as F8, to access the:

1. A) computer’s setup program.
2. B) operating system source code.
3. C) list of software application programs.
4. D) kernel.

Diff: 2

Reference:  Step 1: The BIOS and Setup Program

14) Which of the following checks to see that the hardware is operating appropriately?

1. A) RAM
2. B) BIOS
3. C) ROM
4. D) POST

Diff: 2

Reference:  Step 2: The Power-On Self-Test

15) PnP is an abbreviation for which of the following terms?

1. A) Package-and-Protect
2. B) Peripheral-and-Plugin
3. C) Passive-and-Predictive
4. D) Plug-and-Play

Diff: 1

Reference:  Step 4: System Configuration

16) All of the following are involved in loading the operating system EXCEPT:

2. B) adjusting the setup program in the BIOS.
3. C) searching for the operating system.

Diff: 2

17) An operating system with PnP capabilities means that the system:

1. A) automatically downloads drivers from the Internet for new peripherals that you installed.
2. B) can record and play sound files.
3. C) recognizes new peripherals that were attached before you turned the computer power on and then installs the appropriate drivers and checks for conflicts with other devices.
4. D) can install the appropriate driver for a newly attached piece of hardware as long as the operating system was released before the hardware model was first produced.

Diff: 2

Reference:  Step 4: System Configuration

18) A utility program that contains the instructions to make peripheral devices function correctly is a:

1. A) specialized OS.
2. B) peripheral OS.
3. C) standalone program.
4. D) driver.

Diff: 1

Reference:  System Configuration

19) System utilities:

1. A) have to be accessed through applications.
2. B) include features such as a word-processing program.
3. C) perform functions such as protecting your computer from viruses.

Diff: 1

20) All of the following are needed to access your computer in a multiuser environment EXCEPT a(n):

2. B) user name.
3. C) home directory.

Diff: 2

Reference:  Step 6: Authenticating Users

21) An operating system that requires you to quit one application before starting a different application is referred to as a ________ operating system.

3. C) foreground
4. D) background

Diff: 1

Reference:  Managing Applications

1. A) is available in older versions of Microsoft Windows.
2. B) means that all open programs will shut down if one of the programs stops working.
4. D) allows you to save your work and close the program if the program crashes.

Diff: 3

Reference:  Managing Applications

23) If one running application invades another’s memory space, one or both will:

1. A) crash.
2. B) become unstable.
3. C) Both A and B.
4. D) Neither A nor B.

Diff: 3

Reference:  Managing Applications

24) Virtual memory is an enhanced way to utilize the main memory by:

1. A) using a part of ROM as an extension of RAM to conserve the main memory.
2. B) using a hard disk swap file when memory is full.
3. C) dividing data and instructions into multitasking units.
4. D) creating pages of variable size to use when the swap file is full.

Diff: 3

Reference:  Managing Memory

25) The ________ is responsible for managing memory.

1. A) operating system
2. B) embedded memory program
3. C) buffer
4. D) firmware

Diff: 1

Reference:  Managing Memory

26) Although virtual memory enables users to work with more memory than the amount of RAM installed on the computer, ________ slows the computer down.

1. A) memory scrubbing
2. B) segmentation
3. C) the operating system
4. D) paging

Diff: 2

Reference:  Managing Memory

27) The best way to improve the performance of your computer is to:

1. A) increase the size of the swap file so that you can use variable pages.
2. B) increase the use of virtual memory because the paging technique increases the speed of the memory.
3. C) install more RAM in the computer because the random access memory works faster than the hard disk.
4. D) install a larger hard disk in the computer so that you can store more swap files.

Diff: 1

Reference:  Managing Memory

28) Drivers for frequently used input and output devices are:

1. A) no longer needed if the computer has Plug-and-Play capability.
2. B) programs that enable the user to install the system utilities faster.
3. C) often included with most operating systems.
4. D) interchangeable because input and output devices can now use the same information to enable them to work.

Diff: 2

Reference:  Handling Input and Output

29) A boot disk:

1. A) should be present when the computer starts up normally.
2. B) is an emergency disk that loads the entire operating system.
3. C) contains special files from the computer manufacturer and therefore cannot be created by the user.
4. D) can be used for troubleshooting purposes.

Diff: 1

Reference:  Troubleshooting

30) Miniprograms that immediately respond when an interrupt occurs are called:

1. A) interrupt diverters.
2. B) interrupt handlers.
3. C) interrupt swappers.
4. D) program exits.

Diff: 3

Reference:  Handling Input and Output

31) Signals that inform the OS that something happened are:

1. A) program defects.
2. B) drivers.
3. C) operating system diversions.
4. D) interrupts.

Diff: 3

Reference:  Handling Input and Output

32) Which of the following computer interfaces is the most popular?

1. A) Command-line
3. C) GUI
4. D) Shortcut keystrokes

Diff: 1

Reference:  Providing the User Interface

33) It is important to defragment your computer disk because fragmented files:

1. A) are not recognized by the computer’s tracking system.
2. B) harm the surface of the computer disk.
3. C) reduce disk performance.
4. D) cannot be opened because the fragmented portions are not linked.

Diff: 2

Reference:  Scanning and Defragmenting Disks

1. A) zip
2. B) encrypt
3. C) decrypt
4. D) decompress

Diff: 2

Reference:  File Compression Utilities

35) Microsoft Windows Server 2008 is designed to support which of the following types of computing in a corporate environment?

1. A) Mobile
2. B) Wireless
3. C) Client/server
4. D) Centralized

Diff: 1

Reference:  Microsoft Windows

36) System utilities are used for all of the following purposes EXCEPT to:

1. A) protect your computer from viruses.
2. B) serve as an Internet interface with your Internet browser.
3. C) create backups of system and application files.
4. D) organize and find files on your computer.

Diff: 2

Reference:  System Utilities: Housekeeping Tools

37) ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.

1. A) Jump list
2. B) Windows Search
3. C) Snap
4. D) Pin

Diff: 2

Reference:  Microsoft Windows

38) Many corporate chief information officers shy away from adopting Linux because:

1. A) it doesn’t have a stable company behind it.
2. B) it’s free.
3. C) it’s powerful.
4. D) it has not been properly tested.

Diff: 2

Reference:  Linux

39) All of the following are true about embedded operating systems EXCEPT:

1. A) they are very compact and efficient.
2. B) examples currently in use include Windows CE and Symbian OS.
3. C) they are designed to be used as a supplement to traditional operating systems.
4. D) they are used in PDAs and cell phones.

Diff: 3

Reference:  Embedded Operating Systems

40) Which of the following operating systems first offered preemptive multitasking to the user?

1. A) Microsoft Windows 2000
2. B) Linux
3. C) Macintosh OS X
4. D) UNIX

Diff: 2

Reference:  UNIX

41) Which of the following is NOT true about open source software?

1. A) Its popularity is declining.
2. B) The basic code is free.
3. C) Devices, such as TiVo and Amazon Kindle, use Linux-based OSs.
4. D) None of the above.

Diff: 3

Reference:  Open Source Software

42) System software includes the operating system and the ________ utilities.

Diff: 1

Reference:  Chapter Introduction

43) The ________ consists of the actions that the OS uses most frequently, such as starting applications.

Diff: 2

Reference:  Starting the Computer

44) The ________ is a database that stores configuration information on installed peripherals and software.

Diff: 2

Reference:  Step 4: System Configuration

45) Virtual memory involves the use of a(n) ________ file on the hard disk to store copies of pages when the memory is full.

Diff: 2

Reference:  Managing Memory

46) In virtual memory, programs and data are divided into fixed size units called ________.

Diff: 2

Reference:  Managing Memory

47) An actual interruption of an event by an interrupt signal is called an interrupt ________, or IRQ.

Diff: 2

Reference:  Handling Input and Output

48) Icons are used in a(n) ________ user interface.

Diff: 1

Reference:  Providing the User Interface

49) The ________ operating system focuses on ease of use, multimedia, application compatibility, and increased security.

Diff: 2

Reference:  Microsoft Windows

50) ________ list is a new Windows 7 feature where right-clicking on an appropriate icon will result in the display of documents, pictures, songs, or Web sites used each day.

Diff: 2

Reference:  Microsoft Windows

51) ________ is a new Windows 7 feature, which is a quick and easy way to resize open windows simply by dragging them to the edges of your screen.

Diff: 2

Reference:  Microsoft Windows

52) The open source operating system created to work on PCs is called ________.

Diff: 2

Reference:  Linux

53) ________ OS was initially developed for PDAs in 1996 for use with a touch screen using graphical user interfaces.

Diff: 2

Reference:  Embedded Operating Systems

54) ________ OS is an open industry standard operating system for data enabled mobile phones.

Diff: 2

Reference:  Embedded Operating Systems

55) Palm ________ runs on the Palm webOS platform, is used to power Smartphones, and responds to a multitouch screen.

Diff: 2

Reference:  Embedded Operating Systems

56) Previously, Macs used a Motorola or IBM chip, but they have switched to the ________ chip.

Diff: 2

Reference:  PC Versus Mac Versus Linux

57) A(n) ________ is determined by the combination of microprocessor chip and OS used by a distinct type of computer.

Diff: 2

Reference:  PC Versus Mac Versus Linux

58) Volunteers have translated versions of ________ into dozens of languages, giving computer users of all types a free alternative to buying traditional OSs.

Diff: 2

Reference:  Open Source Software

59) A(n) ________ backup only copies those files that have been created or changed since the last backup.

Diff: 2

Reference:  Backup Software

60) Drive imaging software creates a(n) ________ image of the entire hard disk.

Diff: 2

Reference:  Backup Software

61) ________ software protects a computer from viruses.

Diff: 1

Reference:  Antivirus Software

62) Antivirus software uses pattern-matching technique to examine files for telltale virus code ________.

Diff: 2

Reference:  Antivirus Software

63) The system utility that you would use to organize the data stored on your computer is called a(n) ________ manager.

Diff: 1

Reference:  Searching for and Managing Files

64) You should use a disk ________ program to reorganize data stored on a computer disk so empty sectors can be eliminated.

Diff: 1

Reference:  Searching for and Managing Files

65) You should use an emergency or ________ disk if your computer fails to start normally.

Diff: 2

Reference:  Troubleshooting

66) A helpful place to look for troubleshooting guidance in Microsoft Windows is the Help and ________ utility.

Diff: 1

Reference:  Troubleshooting

67) To diagnose problems associated with system slowdown, use the Reliability and ________ Monitor.

Diff: 2

Reference:  Troubleshooting

68) Application software includes all the programs that provide the infrastructure and hardware control needed for a computer, its peripheral devices, and other programs to function smoothly.

Diff: 2

Reference:  Chapter Introduction

69) The kernel is the central part of the OS that consists of the actions the OS uses most frequently, such as managing hardware.

Diff: 2

Reference:  Starting the Computer

70) When you first turn on or reset a PC, the CPU immediately begins to execute or work on application instructions.

Diff: 2

Reference:  Step 1: The BIOS and Setup Program

71) Menu-driven interfaces enable you to avoid memorizing keywords and symbols.

Diff: 2

Reference:  Providing the User Interface

72) Accessing data from a hard disk is much faster than accessing it from RAM memory.

Diff: 2

Reference:  Managing Memory

73) The interrupt handler is the actual interruption of an event by an interrupt signal.

Diff: 2

Reference:  Handling Input and Output

74) The option to back up to a home or network drive is only available on the Professional, Enterprise, and Ultimate editions of Windows 7.

Diff: 2

Reference:  Backup Software

75) Palm OS was initially developed for PDAs in 1996 for use with a touch screen using graphical user interfaces.

Diff: 2

Reference:  Embedded Operating Systems

76) Android is the operating system for mobile devices created by Google.

Diff: 1

Reference:  Embedded Operating Systems

77) Common embedded operating systems that are installed on handheld devices include Windows CE, Palm OS, Symbian OS, and Android.

Diff: 2

Reference:  Embedded Operating Systems

78) The Symbian OS boasts a reduced demand on the processor and memory.

Diff: 2

Reference:  Embedded Operating Systems

79) The latest version of Windows CE adds support for Code Division Multiple Access as well as more screen resolutions.

Diff: 3

Reference:  Embedded Operating Systems

80) Although open source code is a free alternative to buying traditional OSs, open source application software is not available.

Diff: 1

Reference:  Open Source Software

81) Linux-based OSs cannot be used with TiVo and Amazon Kindle.

Diff: 1

Reference:  Open Source Software

82) The terms free software and open source software are sometimes used interchangeably, but not everyone agrees that they mean the same thing.

Diff: 2

Reference:  Open Source Software

83) RAM memory is located on the motherboard and holds all programs in use and documents in progress.

Diff: 2

Reference:  Starting the Computer

84) Windows 7 and Windows Vista use Explorer as a file manager.

Diff: 2

Reference:  Searching for and Managing Files

85) A disk cleanup utility will search for and delete unusable files, along with any files in the recycle bin.

Diff: 2

Reference:  Scanning and Defragmenting Disks

86) Disk defragmentation programs are utility programs used to reorganize the disk so empty sectors are eliminated.

Diff: 2

Reference:  Scanning and Defragmenting Disks

87) Compression programs were developed by Microsoft and cannot be used independent of the Windows OS.

Diff: 2

Reference:  File Compression Utilities

88) Windows 7 is available in six versions.

Diff: 1

Reference:  Microsoft Windows

89) Many ISPs offer free antivirus protection to their subscribers.

Diff: 2

Reference:  Antivirus Software

90) Command-line user interfaces are very popular.

Diff: 2

Reference:  Providing the User Interface

Match the following terms to their meanings:

1. A) Operating system used on most personal computers
2. B) Operating system developed by AT&T that used preemptive multitasking
3. C) An operating system for personal computers that uses open source software
4. D) Many computer users prefer this operating system for its security, stability, and ease of use
5. E) Operating system developed by Microsoft that requires the use of a command-line interface

91) Microsoft Windows

Diff: 2

Reference:  Exploring Popular Operating Systems

92) Mac OS

Diff: 2

Reference:  Exploring Popular Operating Systems

93) MS-DOS

Diff: 2

Reference:  Exploring Popular Operating Systems

94) UNIX

Diff: 2

Reference:  Exploring Popular Operating Systems

95) Linux

Diff: 2

Reference:  Exploring Popular Operating Systems

Answers: 91) A 92) D 93) E 94) B 95) C

Match the following terms to their meanings:

1. A) Eliminates any unneeded files
2. B) Revolutionized the software world because the basic code is free
3. C) Coordinates the interaction between application software and computer hardware
4. D) A utility that helps locate a file on your computer disk
5. E) Tools used to keep your computer running smoothly

96) Operating system

Diff: 1

Reference:  The Operating System

97) Open source software

Diff: 2

Reference:  Open Source Software

98) System utilities

Diff: 1

Reference:  System Utilities: Housekeeping Tools

99) Search utility

Diff: 1

Reference:  Searching for and Managing Files

100) Disk cleanup utility

Diff: 1

Reference:  Scanning and Defragmenting Disks

Answers: 96) C 97) B 98) E 99) D 100) A

Computers Are Your Future, 12e (LaBerta)

Chapter 11  Programming Languages and Program Development

1) Which of the following is the process used to create software applications?

1. A) Algorithms
2. B) Pseudocoding
3. C) Programming
4. D) Debugging

Diff: 2

Reference:  Chapter Introduction

2) Software applications are developed by trained experts known as:

1. A) programmers.
2. B) coders.
3. C) analysts.
4. D) debuggers.

Diff: 2

Reference:  Chapter Introduction

3) The artificial language created to tell the computer what to do in a step-by-step manner is known as:

1. A) codification.
2. B) heuristics.
3. C) programming language.
4. D) development language.

Diff: 2

Reference:  Chapter Introduction

4) Program instructions in their original form as written by the programmer are known as:

1. A) flowcharts.
2. B) heuristics.
3. C) object code.
4. D) source code.

Diff: 1

Reference:  Compilers and Interpreters

5) The written computer instructions that programmers create are called:

1. A) blocks.
2. B) object modules.
3. C) code.
4. D) heuristics.

Diff: 1

Reference:  Compilers and Interpreters

6) Which of the following types of language is representative of the first generation of programming languages?

1. A) Assembly
2. B) Machine
3. C) Procedural
4. D) Object-oriented

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

7) Machine language is said to be machine dependent because it is dependent on the:

1. A) version of memory.
2. B) hard drive.
3. C) processor.
4. D) source code.

Diff: 2

Reference:  First-Generation Languages (1GL): 0S and 1S

8) In assembly language, each program statement corresponds to a(n):

1. A) object.
2. B) instruction.
3. C) program.
4. D) control structure.

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

9) Which of the following is the first step toward a true natural language interface?

1. A) Control classes
2. B) Continuous speech recognition
3. C) Mnemonics
4. D) Fast compilers

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

10) Which of the following is NOT a general feature of third-generation procedural languages?

1. A) They are translated into machine language by tools such as compilers and interpreters.
2. B) Their use frees programmers from needing to know all the details of how the computer processes data.
3. C) They use familiar English words such as PRINT or IF.
4. D) The programmer describes what he or she wishes to accomplish, and the language automatically generates code to accomplish the task.

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

11) When the compiler translates code, it:

1. A) determines the number of lines of code.
2. B) checks for the programmer identification.
3. C) translates source code into object code.
4. D) calculates the amount of disk space.

Diff: 2

Reference:  Compilers and Interpreters

12) An interpreter translates code ________ at a time.

1. A) one module
2. B) one line
3. C) one block
4. D) all lines

Diff: 2

Reference:  Compilers and Interpreters

13) Which of the following is the best definition of spaghetti code?

1. A) It is code characterized by loops in which blocks of code repeat.
2. B) It is code containing many GOTO statements that cause unconditional jumps from one section of code to another.
3. C) It is code containing many IF statements in which different statements are executed, depending on the state of the data.
4. D) It is the term for an inefficient program, often written by a novice programmer.

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

14) Which of the following types of programming uses a set of quality standards that make programs more readable and maintainable?

1. A) Low-level
2. B) Unstructured
3. C) Algorithmic
4. D) Structured

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

15) Which of the following is the purpose of information hiding in software development?

1. A) It protects source code from the eyes of competitors.
2. B) It frees the programmer from dealing with hardware issues such as memory management.
3. C) It allows one programmer to use a module written by another without having to be concerned with its inner details.
4. D) It prevents data from being inadvertently destroyed during execution of a program.

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

16) With modular programming, each module requires a specific ________ and produces a specific ________.

1. A) output; input
2. B) input; output
3. C) input; workflow
4. D) workflow; output

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

17) Structured query language (SQL) used in conjunction with databases is often used as an example of a ________-generation language.

1. A) first
2. B) second
3. C) third
4. D) fourth

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

18) Which of the following types of languages are NOT tied down to step-by-step procedures?

1. A) Low-level
2. B) Nonregulatory
3. C) Nonprocedural
4. D) Evolved

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

19) Which of the following programming languages is NOT one of today’s most popular programming languages?

1. A) PHP
2. B) Fortran
3. C) Visual Basic
4. D) Java

Diff: 3

Reference:  Structured and Modular Languages

20) Much of what passes for ________ language interface is simply word matching.

1. A) natural
2. B) high-level
3. C) procedural
4. D) object

Diff: 2

Reference:  Fifth-Generation Languages: Natural Language

21) The procedures contained within an object are also called:

1. A) object code.
2. B) source code.
3. C) methods.
4. D) mnemonics.

Diff: 2

Reference:  Object-Oriented Programming

22) With object-oriented programming, information hiding is also known as:

1. A) conversion.
2. B) encapsulation.
3. C) translation.
4. D) inheritance.

Diff: 1

Reference:  Object-Oriented Programming

23) An important feature of object-oriented programming is the concept of ________, a category of objects.

1. A) module
2. B) capsules
3. C) class
4. D) methods

Diff: 2

Reference:  Object-Oriented Programming

24) Assume you developed a programming class to represent computers. Classes that represent specialized types of printers, such as Acer or Dell, would be called:

1. A) objects.
2. B) control classes.
3. C) subclasses.
4. D) super classes.

Diff: 3

Reference:  Object-Oriented Programming

25) When using the class programming construct, a(n) ________ inherits data and functions from its parent class.

1. A) subclass
2. B) object
3. C) nested
4. D) super class

Diff: 3

Reference:  Object-Oriented Programming

26) The term middleware refers to:

1. A) rapid application development techniques.
2. B) programs written in fourth-generation languages.
3. C) software that makes the connection between varied applications working on multiple platforms.
4. D) object-oriented databases that store both data and procedures to manipulate the data.

Diff: 3

Reference:  Object-Oriented Programming

27) Middleware is integral to modern information technology regarding all of the following EXCEPT:

1. A) XML.
2. B) service-oriented architecture.
3. C) Web services.
4. D) interface and coding relationships.

Diff: 3

Reference:  Object-Oriented Programming

28) Which of the following is NOT true about Visual Basic?

1. A) Developing a user interface is the first step in Visual Basic program development.
2. B) It is an event-driven programming language.
3. C) Its code executes in response to user actions.
4. D) It should not be used by novice programmers.

Diff: 2

Reference:  Structured and Modular Languages

29) ________ is a high-level programming language, which combines the virtues of high-level programming languages with the efficiency of an assembly language.

1. A) Fortran
2. B) C
3. C) C++
4. D) Visual Basic

Diff: 2

Reference:  Structured and Modular Languages

30) ________ is an open source object-oriented programming language, which was released in 1995.

1. A) Ajax
2. B) Ruby
3. C) PHP
4. D) XML

Diff: 1

Reference:  Object-Oriented Languages

31) Which of the programming languages is one of the earliest and at one time, was the most widely used business programming language in the world?

1. A) Visual Basic
2. B) C++
3. C) COBOL
4. D) Java

Diff: 2

Reference:  COBOL and Fortran: Historically Important

32) Which of the following is NOT a feature of the Java programming language?

1. A) Java includes miniprograms called applets that are made available through a network or over the Internet.
2. B) A program written in Java can be executed on any type of computer that has installed the Java Virtual Machine software.
3. C) Java programs execute much faster than those written in languages such as C or C++.
4. D) The Java language enables programmers to create programs that “write once, run everywhere.”

Diff: 3

Reference:  Object-Oriented Languages

33) A markup language uses ________ to define the structure of the text.

1. A) tags
2. B) elements
3. C) mnemonics
4. D) control structures

Diff: 2

Reference:  Web-Based Languages

34)  HTML is written in:

1. A) pseudocode.
2. B) plain text.
3. C) JavaScript.
4. D) C++.

Diff: 1

Reference:  Web-Based Languages

35) Which of the following markup languages is used for sharing data and complex forms in a Web-based environment?

1. A) Visual Studio.NET
2. B) HTML
3. C) Active
4. D) XML

Diff: 1

Reference:  Web-Based Languages

36) How many phases exist in the program development life cycle?

1. A) Three
2. B) Four
3. C) Five
4. D) Six

Diff: 3

Reference:  The Program Development Life Cycle

37) The last phase of the program development life cycle is concerned with:

1. A) documentation.
2. B) coding.
3. C) designing the solution.
4. D) implementation and maintenance.

Diff: 1

Reference:  PDLC Phase 6: Implementing and Maintaining the Program

38) In ________ program design, a program is designed by focusing on the main goal to be achieved and then breaking up the program into manageable components.

1. A) object-oriented
2. B) algorithmic
3. C) control structure
4. D) top-down

Diff: 1

Reference:  PDLC Phase 2: Designing the Program

39) Program documentation might include all of the following EXCEPT:

1. A) descriptions of error messages.
2. B) reference documentation of program commands.
3. C) object code.
4. D) tutorials for new users.

Diff: 2

Reference:  PDLC Phase 5: Documenting the Program

40) ________ programming language encapsulate information and increase code security by defining objects, as well as their components, and actions.

1. A) Web-based
2. B) Object-oriented
3. C) Structured query
4. D) Report generator

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

41) The vocabulary and set of rules that a programmer must learn and follow is ________.

Diff: 1

Reference:  Programming Languages and How They Work

42) Machine language consists of ________ numbers, 1s and 0s, that directly correspond to the computer’s electrical states.

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

43) An easy-to-recognize abbreviation, such as MOV or ADD, used in assembly language is called a(n) ________.

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

44) One level up from a computer’s machine language is called a(n) ________-level language.

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

45) ________-level languages eliminate the need for programmers to understand the intimate details of how the computer processes data.

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

46) The programming specifications that are created in Java and used to create reusable, platform-independent Java components are called ________.

Diff: 2

Reference:  Object-Oriented Languages

47) The ultimate nonprocedural language would be ________ language, the everyday language that people speak.

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

48) The Microsoft middleware product is called ________.

Diff: 2

Reference:  Object-Oriented Programming

49) Object-oriented programming enables a fast method of program development called ________ application development (RAD).

Diff: 2

Reference:  Object-Oriented Programming

50) A(n) ________ language, such as English, is considered the fifth generation of programming languages.

Diff: 2

Reference:  Fifth-Generation Languages: Natural Language

51) One of the earliest high-level programming languages, ________ was used primarily for business applications.

Diff: 2

Reference:  COBOL and Fortran: Historically Important

52) The ________ language was used heavily until the mid-1990s as the language of choice for the Department of Defense.

Diff: 2

Reference:  Structured and Modular Languages

53) WML is an acronym that stands for ________ Markup Language.

Diff: 2

Reference:  Web-Based Languages

54) Simple programs that control action or feedback on Web pages are ________.

Diff: 2

Reference:  Web-Based Languages

55) ________ is a programming language developed by AT&T’s Bell Labs in the 1970s that combines features of both high- and low-level languages.

Diff: 2

Reference:  Structured and Modular Languages

56) A general purpose, server-side, open source, cross-platform scripting language used primarily to make dynamic Web sites is known by the acronym ________.

Diff: 2

Reference:  Web-Based Languages

57) ________, short for JavaScript Object Notation, is a text-based, human-readable technique for representing simple data structures and objects.

Diff: 2

Reference:  Web-Based Languages

58) Standardizing HTML and XHTML, as well as forcing the separation of content from formatting, is the responsibility of the World Wide Web Consortium, which is known by the acronym ________.

Diff: 2

Reference:  Web-Based Languages

59) IF-THEN-ELSE and DO-WHILE are examples of programming ________ structures.

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

60) Syntax and logic errors are collectively known as ________.

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

61) The process of eliminating logic and syntax errors is known as ________.

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

62) A(n) ________ error is a mistake the programmer makes in designing the solution to a problem.

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

63) ________ Modeling Language (UML) is an open method used to illustrate and document the components of an object-oriented software system under development.

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

64) A stylized form of writing that is used to describe a program’s logic is called ________.

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

65) Visual Basic uses the ________-driven programming language in which code modules are written to execute in response to user actions.

Diff: 2

Reference:  Structured and Modular Languages

66) WML is a specialized form of XML used by wireless devices.

Diff: 2

Reference:  Web-Based Languages

67) Inheritance refers to an object’s capacity to replicate itself.

Diff: 2

Reference:  Object-Oriented Programming

68) Machine language consists of binary numbers-0s and 1s.

Diff: 2

Reference:  First-Generation Languages (1GL): 0S and 1S

69) Procedural languages do NOT require the programmer to specify the steps in the program.

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

70) A compiler translates source code into object code.

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

71) Report generators and query languages are examples of nonprocedural languages.

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

72) Natural language is the everyday language that people speak.

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

73) Object-oriented programming is a technique similar to structured programming.

Diff: 2

Reference:  Object-Oriented Programming

74) An object is the combination of data and methods.

Diff: 2

Reference:  Object-Oriented Programming

75) COBOL is the least used business programming language.

Diff: 2

Reference:  COBOL and Fortran: Historically Important

76) BASIC is widely accepted as a teaching language in academia.

Diff: 2

Reference:  Structured and Modular Languages

77) Another term for information hiding is encapsulation.

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

78) Ada is an event-driven programming language.

Diff: 2

Reference:  Structured and Modular Languages

79) An event-driven programming language is designed to execute in response to user actions.

Diff: 2

Reference:  Structured and Modular Languages

80) C is a language that combines the benefits of high-level programming languages with the efficiency of an assembly language.

Diff: 2

Reference:  Structured and Modular Languages

81) Agile methods encourage teamwork, self-organization, and accountability.

Diff: 2

Reference:  Object-Oriented Languages

82) A programmer must write code that describes an object when using RAD.

Diff: 1

Reference:  Object-Oriented Languages

83) Java is considered to be an object-oriented, high-level, cross-platform programming language.

Diff: 1

Reference:  Object-Oriented Languages

84) Middleware is software that enables access to objects and queries them about what types of data they contain.

Diff: 2

Reference:  Object-Oriented Programming

85) Fortran is used to solve scientific, mathematical, and engineering problems.

Diff: 2

Reference:  COBOL and Fortran: Historically Important

86) An algorithm is another term for detailed specification.

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

87) The program specification defines the detailed coding that is to take place.

Diff: 1

Reference:  PDLC Phase 1: Defining the Problem

88) An important feature of object-oriented programming is the concept of class.

Diff: 1

Reference:  Object-Oriented Programming

89) Joint application development is a development method that involves the end user in the planning stage.

Diff: 2

Reference:  Object-Oriented Programming

90) Information hiding requires the author of one module to be aware of the details of other modules.

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

Match the following programming language generations to their descriptions:

1. A) Includes report generators and query languages
2. B) A high-level language that includes familiar English words
3. C) Includes assembly language
4. D) Includes machine language
5. E) Includes natural language

91) First

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

92) Third

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

93) Fifth

Diff: 1

Reference:  Fifth-Generation Languages: Natural Language

94) Second

Diff: 1

Reference:  Second-Generation Languages (2GL): Using Mnemonics

95) Fourth

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

Answers: 91) D 92) B 93) E 94) C 95) A

Match the following languages to their descriptions:

1. A) Used on Web pages
2. B) Recent cross-platform language
3. C) Suited for mathematical problem solving
4. D) Used for fast development of Windows applications
5. E) Used primarily by the Department of Defense

Diff: 2

Reference:  Structured and Modular Languages

97) Java

Diff: 2

Reference:  Object-Oriented Programming

98) Visual Basic

Diff: 2

Reference:  Structured and Modular Languages

99) Fortran

Diff: 2

Reference:  COBOL and Fortran: Historically Important

100) HTML

Diff: 2

Reference:  Web-Based Languages

Answers: 96) E 97) B 98) D 99) C 100) A

## Reviews

There are no reviews yet.