Computers Are Your Future 12th Edition by LaBerta – Test Bank

$30.00

Description

INSTANT DOWNLOAD COMPLETE TEST BANK WITH ANSWERS
Computers Are Your Future 12th Edition by LaBerta – Test Bank

 

Computers Are Your Future, 12e (LaBerta)

Chapter 2  Inside the System Unit

 

1) A byte:

  1. A) is the equivalent of eight binary digits.
  2. B) represents one digit in the decimal numbering system.
  3. C) is the smallest unit of information that a computer can process.
  4. D) can be compared to the state of one light switch being either on or off.

Answer:  A

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

2) Computers count with ________ numbers.

  1. A) regular
  2. B) binary
  3. C) decimal
  4. D) digital

Answer:  B

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

3) Of the following, which represents the largest amount of data?

  1. A) Terabyte
  2. B) Megabyte
  3. C) Petabyte
  4. D) Kilobyte

Answer:  C

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

4) Approximately how much text is stored in a gigabyte?

  1. A) 1 page
  2. B) 1,000 pages
  3. C) 1 book
  4. D) 1,000 books

Answer:  D

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

5) A yottabyte represents 1 ________ bytes.

  1. A) septillion
  2. B) million
  3. C) quadrillion
  4. D) trillion

Answer:  A

Diff: 3

Reference:  Representing Data as Bits and Bytes

6) Five bits result in ________ possibilities.

  1. A) 5
  2. B) 20
  3. C) 26
  4. D) 32

Answer:  D

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

7) Comparing a binary digit to a ________ is an easy-to-understand analogy.

  1. A) highway
  2. B) light switch
  3. C) storage bin
  4. D) memory chip

Answer:  B

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

8) The hexadecimal representation for the decimal 10 is:

  1. A) 10.
  2. B) B.
  3. C) 15.
  4. D) A.

Answer:  D

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

9) Hexadecimal numbers are represented using numbers 0 to 9 and letters ________.

  1. A) A to F
  2. B) A to Z
  3. C) A to D
  4. D) None of the above

Answer:  A

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

10) A ________ is the smallest unit of information that a computer can work with.

  1. A) byte
  2. B) bit
  3. C) register
  4. D) hex

Answer:  B

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

11) Floating-point notation:

  1. A) has no advantage if used with numbers containing fractional points.
  2. B) uses no fixed number of digits before or after the decimal point.
  3. C) requires newer computers to have a special chip called a math coprocessor.
  4. D) allows the computer to work with very large, but not very small, numbers.

Answer:  B

Diff: 2

Reference:  Representing Very Large and Very Small Numbers

 

12) All of the following are examples of character codes EXCEPT:

  1. A) SCSI.
  2. B) ASCII.
  3. C) EDCDIC.
  4. D) Unicode.

Answer:  A

Diff: 2

Reference:  Representing Characters: Character Code

 

13) An algorithm used as a bridge between binary code and keyboard characters is known as:

  1. A) cache.
  2. B) hot swapping.
  3. C) data dependency.
  4. D) character code.

Answer:  D

Diff: 2

Reference:  Representing Characters: Character Code

 

14) ________ is becoming more popular than previously used character codes due to its ability to represent most, if not all, of the world’s languages.

  1. A) Extended ASCII
  2. B) ASCII
  3. C) Unicode
  4. D) EDCDIC

Answer:  C

Diff: 2

Reference:  Representing Characters: Character Code

 

15) The most widely used character code is:

  1. A) EBCDIC.
  2. B) HTML.
  3. C) ASCII.
  4. D) Unicode.

Answer:  C

Diff: 2

Reference:  Representing Characters: Character Code

 

16) The ________ contains a computer’s main hardware components.

  1. A) motherboard
  2. B) system unit
  3. C) CPU
  4. D) master case

Answer:  B

Diff: 1

Reference:  Introducing the System Unit

 

17) Which of the following components would NOT be found inside the system unit?

  1. A) Motherboard
  2. B) USB port
  3. C) Power supply
  4. D) Cooling fan

Answer:  B

Diff: 1

Reference:  Inside the System Unit

 

18) In the strictest sense of the term, the ________ contains the CPU.

  1. A) system unit
  2. B) unit frame
  3. C) motherboard
  4. D) computing platform

Answer:  C

Diff: 1

Reference:  Inside the System Unit

 

19) Which of the following would NOT be found on the motherboard?

  1. A) Microprocessor
  2. B) System clock
  3. C) Drive bays
  4. D) Input/output buses

Answer:  C

Diff: 2

Reference:  What’s on the Motherboard?

 

20) The central processing unit (CPU):

  1. A) plays a minimal role in processing data.
  2. B) is different from a microprocessor.
  3. C) is a fairly simple device.
  4. D) is an integrated chip capable of processing signals.

Answer:  D

Diff: 1

Reference:  The CPU: The Microprocessor

 

21) A processor’s instruction set:

  1. A) is unique to the type of processor.
  2. B) is the same for different types of processors.
  3. C) will run programs that were created for an incompatible processor.
  4. D) has nothing to do with the ability of the computer to run a program.

Answer:  A

Diff: 2

Reference:  The Instruction Set

 

22) The four-step process of fetch, decode, execute, and store is called a(n):

  1. A) arithmetic operation.
  2. B) machine cycle.
  3. C) instruction cycle.
  4. D) logical operation.

Answer:  B

Diff: 1

Reference:  Microprocessor Performance

 

23) Which of the following subcomponents of the CPU takes instructions from memory and decodes the instructions?

  1. A) Arithmetic-logic unit
  2. B) Microprocessor
  3. C) Data bus
  4. D) Control unit

Answer:  D

Diff: 2

Reference:  Microprocessor Performance

 

24) Which of the following is NOT one of the steps in the machine cycle?

  1. A) Pipeline
  2. B) Decode
  3. C) Execute
  4. D) Store

Answer:  A

Diff: 2

Reference:  Microprocessor Performance

 

25) The greater the number of ________ on a microprocessor, and proximity to each other, the faster the processing speed.

  1. A) transistors
  2. B) disks
  3. C) buses
  4. D) registers

Answer:  A

Diff: 2

Reference:  Microprocessor Performance

 

26) Which of the following operating systems was the first to use the 64-bit technology?

  1. A) Mac OS X
  2. B) Linux
  3. C) MS-DOS
  4. D) Windows XP

Answer:  B

Diff: 3

Reference:  Data Bus Width and Word Size

 

27) A CPU’s word size is important because it determines which ________ the CPU can use.

  1. A) application software
  2. B) input devices
  3. C) disk storage
  4. D) operating system

Answer:  D

Diff: 3

Reference:  Data Bus Width and Word Size

 

28) The number of operations per clock tick affects:

  1. A) microprocessor performance.
  2. B) monitor resolution.
  3. C) disk drive capacity.
  4. D) the bus size.

Answer:  A

Diff: 1

Reference:  Operations per Cycle

 

29) A technique that uses more than one processor to execute a program is called:

  1. A) parallel processing.
  2. B) serial processing.
  3. C) co-processing.
  4. D) megaprocessing.

Answer:  A

Diff: 1

Reference:  Parallel Processing

 

30) Which of the following input/output buses is used by today’s PCs?

  1. A) PCI
  2. B) CPU
  3. C) L2
  4. D) AGP

Answer:  A

Diff: 2

Reference:  The Chipset and the Input/Output Bus

 

31) RAM stands for:

  1. A) rapidly accessed memory.
  2. B) random access memory.
  3. C) reliable associated memory.
  4. D) repeated auxiliary memory.

Answer:  B

Diff: 1

Reference:  RAM

 

32) Each memory address is stored in ________ form.

  1. A) serial
  2. B) compressed
  3. C) parallel
  4. D) binary

Answer:  D

Diff: 1

Reference:  RAM

 

33) Although introduced in 1995, the USB didn’t become widely used until the release of the:

  1. A) Blackberry.
  2. B) iMac.
  3. C) iPod.
  4. D) iTunes.

Answer:  B

Diff: 3

Reference:  USB Ports

 

34) A memory ________ is the amount of RAM a program uses when it is operational.

  1. A) stash
  2. B) footprint
  3. C) cache
  4. D) utility

Answer:  B

Diff: 1

Reference:  RAM

 

35) Which of the following types of memory has L1, L2, and L3 levels of storage?

  1. A) RAM
  2. B) ROM
  3. C) cache
  4. D) flash

Answer:  C

Diff: 1

Reference:  Cache Memory

 

36) How many peripheral devices can be connected to a single USB port?

  1. A) 1
  2. B) 8
  3. C) 64
  4. D) 127

Answer:  D

Diff: 3

Reference:  USB Ports

 

37) On non-Apple systems, the FireWire port is called a ________ port.

  1. A) 1439
  2. B) 2008
  3. C) 1995
  4. D) 1394

Answer:  D

Diff: 2

Reference:  1394 Ports (FireWire)

 

38) The ExpressCard is also known as the ________ card.

  1. A) SCSI
  2. B) PCMCIA
  3. C) PS/2
  4. D) VGA

Answer:  B

Diff: 1

Reference:  Additional Ports and Connectors

 

39) The ExpressCard provides enhancements in all of the following areas EXCEPT:

  1. A) wireless communication.
  2. B) additional memory.
  3. C) multimedia.
  4. D) cost.

Answer:  D

Diff: 1

Reference:  Additional Ports and Connectors

 

40) If your computer doesn’t have enough USB ports, it is possible to obtain a USB ________.

  1. A) hub
  2. B) router
  3. C) PBX
  4. D) multiplexer

Answer:  A

Diff: 3

Reference:  USB Ports

 

 

41) ________ numbers consist of only two digits.

Answer:  Binary

Diff: 1

Reference:  Representing Data as Bits and Bytes

42) A(n) ________, also known as a PB, is equivalent to a quadrillion bytes.

Answer:  petabyte

Diff: 1

Reference:  Representing Data as Bits and Bytes

 

43) ________-point notation is used to represent exceedingly large or exceedingly small numbers as well as numbers with fractional parts.

Answer:  Floating

Diff: 2

Reference:  Representing Very Large and Very Small Numbers

 

44) A(n) ________ is the smallest piece of information with which a computer can work.

Answer:  bit

Diff: 1

Reference:  Representing Data as Bits and Bytes

 

45) The American ________ Code for Information Interchange (ASCII) character code is most widely used on minicomputers, personal computers, and computers that make information available on the Internet.

Answer:  Standard

Diff: 2

Reference:  Representing Characters: Character Code

 

46) The amount of room that a system unit needs to fit on the desk is called the ________.

Answer:  footprint

Diff: 1

Reference:  Introducing the System Unit

 

47) The arrangement of internal components within the system unit is called the ________ factor.

Answer:  form

Diff: 2

Reference:  Introducing the System Unit

 

48) The ________ is the large printed circuit board that holds the computer’s important components such as the microprocessor.

Answer:  motherboard

Diff: 1

Reference:  What’s on the Motherboard?

 

 

49) Calculations and comparisons are performed in the ALU, also known as the ________-logic unit.

Answer:  arithmetic

Diff: 2

Reference:  Microprocessor Performance

 

50) A machine cycle includes the instruction cycle and the ________ cycle.

Answer:  execution

Diff: 1

Reference:  Data Bus Width and Word Size

51) The maximum number of bits processed by the CPU is called its ________ size.

Answer:  word

Diff: 1

Reference:  Data Bus Width and Word Size

 

52) Superscalar architecture takes advantage of ________ to perform more than one instruction per clock tick.

Answer:  pipelining

Diff: 2

Reference:  Operations per Cycle

 

53) A collection of chips that are designed to move data between the microprocessor and the rest of the computer is called the ________.

Answer:  chipset

Diff: 2

Reference:  The Chipset and the Input/Output Bus

 

54) A computer uses ________ memory when the RAM gets full.

Answer:  virtual

Diff: 3

Reference:  RAM

 

55) Memory that the processor can use to store frequently accessed program instructions and data to improve the overall speed of the computer is called ________ memory.

Answer:  cache

Diff: 1

Reference:  Cache Memory

 

56) ________ or L1 cache memory is located in the microprocessor chip.

Answer:  Primary

Diff: 1

Reference:  Cache Memory

 

57) The official name for Apple FireWire or Sony i.Link ports is an IEEE ________ port.

Answer:  1394

Diff: 2

Reference:  1394 Ports (FireWire)

58) Being able to connect and disconnect peripheral devices without having to shut the computer down is called ________ swapping.

Answer:  hot

Diff: 2

Reference:  USB Ports

 

59) A(n) ________ is an electronic switch that directs the flow of electrical signals in a computer.

Answer:  transistor

Diff: 2

Reference:  What’s on the Motherboard?

60) ________ is older technology, device, or application that is being phased out in favor of advance in new technology.

Answer:  Legacy technology

Diff: 2

Reference:  Additional Ports and Connectors

 

61) The Core i7 Extreme Edition microprocessor has a clock speed of ________.

Answer:  3.30 GHz

Diff: 2

Reference:  Popular Microprocessors

 

62) Heat is removed from the CPU by using heat sink or ________.

Answer:  fan

Diff: 1

Reference:  Processor Slots and Sockets

 

63) An integrated circuit contains millions of ________.

Answer:  transistors

Diff: 2

Reference:  What’s on the Motherboard?

 

64) The ________ step in the machine cycle interprets what action the program is telling the computer to perform.

Answer:  decode

Diff: 1

Reference:  Microprocessor Performance

 

65) The maximum number of bits processed by the CPU is called its ________ size.

Answer:  word

Diff: 1

Reference:  Data Bus Width and Word Size

 

66) The newest standard for the PC card, mostly used in notebooks, is called the ExpressCard.

Answer:  TRUE

Diff: 2

Reference:  Additional Ports and Connectors

67) Biometric authentication is individualized and cannot be fooled.

Answer:  FALSE

Diff: 2

Reference:  Introducing the System Unit

 

68) A byte is the smallest unit of information.

Answer:  FALSE

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

69) Hexadecimal numbers use the numbers 0 to 9 and the letters A to F.

Answer:  TRUE

Diff: 2

Reference:  Representing Data as Bits and Bytes

70) Hexadecimal uses base 16 characters.

Answer:  TRUE

Diff: 2

Reference:  Representing Data as Bits and Bytes

 

71) The form factor is a specification for how internal components are mounted in the system unit.

Answer:  FALSE

Diff: 2

Reference:  Introducing the System Unit

 

72) The motherboard contains the CPU.

Answer:  TRUE

Diff: 1

Reference:  Inside the System Unit

 

73) A heat sink keeps the system unit cool.

Answer:  TRUE

Diff: 2

Reference:  Processor Slots and Sockets

 

74) Intel is the only producer of PC chips.

Answer:  FALSE

Diff: 2

Reference:  The Instruction Set

 

75) A memory address is stored in binary form.

Answer:  TRUE

Diff: 2

Reference:  RAM

 

 

76) PROM requires a special device to write instructions on a blank chip one time only.

Answer:  TRUE

Diff: 2

Reference:  ROM

 

77) EPROM can only be rewritten twice.

Answer:  FALSE

Diff: 2

Reference:  ROM

 

78) Keeping secondary cache as close as possible to the processor improves performance.

Answer:  TRUE

Diff: 2

Reference:  Cache Memory

 

79) The drive activity light tells you when the hard drive is accessing data.

Answer:  TRUE

Diff: 2

Reference:  The Front Panel

80) USB stands for Universal Serial Bus.

Answer:  TRUE

Diff: 1

Reference:  USB Ports

 

81) Computer manufacturers are increasing numbers of USB ports because of their convenience and versatility.

Answer:  TRUE

Diff: 2

Reference:  USB Ports

 

82) Additional circuit boards are installed at expansion slots.

Answer:  TRUE

Diff: 2

Reference:  Inside the System Unit

 

83)  The system unit houses the computer’s peripheral hardware components.

Answer:  FALSE

Diff: 2

Reference:  Introducing the System Unit

 

84) If a program is compatible, it is said to be a native application for a given processor design.

Answer:  TRUE

Diff: 2

Reference:  The Instruction Set

 

 

85) There are five steps of the machine cycle.

Answer:  FALSE

Diff: 1

Reference:  The Machine Cycle

 

86) The instruction cycle includes decode and execute.

Answer:  FALSE

Diff: 2

Reference:  The Machine Cycle

 

87) DDR2-SDRAM and DDR3-SDRAM need to have a constant power supply to avoid losing their contents.

Answer:  TRUE

Diff: 2

Reference:  RAM

 

88) A machine cycle includes the instruction cycle and the execution cycle.

Answer:  TRUE

Diff: 1

Reference:  Data Bus Width and Word Size

 

89) The execute step in the machine cycle interprets what action the program is telling the computer to perform.

Answer:  FALSE

Diff: 1

Reference:  Microprocessor Performance

90) The bus used for video and graphics displays is known as the AGP or Accelerated Graphics Port.

Answer:  TRUE

Diff: 1

Reference:  The Chipset and the Input/Output Bus

 


Match the following terms to their descriptions:

 

  1. A) The number system used by computers
  2. B) Most widely used character code
  3. C) Uses base 16 characters to represent binary numbers
  4. D) A character coding method created by IBM and used on its mainframes
  5. E) One quintillion bytes

 

91) ASCII

Diff: 3

Reference:  Representing Characters: Character Code

 

92) Binary

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

93) EBCDIC

Diff: 3

Reference:  Representing Characters: Character Code

 

94) Hexadecimal

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

95) Exabyte

Diff: 3

Reference:  Representing Data as Bits and Bytes

 

Answers: 91) B 92) A 93) D 94) C 95) E


Match the following terms to their meanings:

 

  1. A) The amount of space taken up by the case on the desk
  2. B) Any size of case that contains the computer’s main hardware
  3. C) Specification for mounting internal components such as the motherboard
  4. D) Performs a specific action such as adding two numbers
  5. E) Prevents computer components from being damaged by heat

 

96) System unit

Diff: 2

Reference:  Introducing the System Unit

 

97) Footprint

Diff: 2

Reference:  Introducing the System Unit

 

98) Form factor

Diff: 2

Reference:  Introducing the System Unit

 

99) Cooling fan

Diff: 2

Reference:  Inside the System Unit

 

100) Execute

Diff: 1

Reference:  Microprocessor Performance

 

Answers: 96) B 97) A 98) C 99) E 100) D

Computers Are Your Future, 12e (LaBerta)

Chapter 4  System Software

 

1) ________ includes all the programs that provide the infrastructure and hardware control needed for a computer, its peripheral devices, and other programs to function smoothly.

  1. A) Application software
  2. B) Open source software
  3. C) Network software
  4. D) System software

Answer:  D

Diff: 2

Reference:  Chapter Introduction

 

2) The set of programs designed to manage the resources of a computer is the:

  1. A) resource manager.
  2. B) operating system.
  3. C) boot strap set.
  4. D) utility set.

Answer:  B

Diff: 2

Reference:  The Operating System

 

3) Like a traffic officer, the computer’s OS works at the intersection of:

  1. A) application software, the user, and the computer’s hardware.
  2. B) application software and the user.
  3. C) application software and the computer’s hardware.
  4. D) the user and the computer’s hardware.

Answer:  A

Diff: 2

Reference:  The Operating System

 

4) The process of loading the OS to memory is which of the following?

  1. A) Configuration
  2. B) Booting
  3. C) Authentication
  4. D) Installing

Answer:  B

Diff: 2

Reference:  Starting the Computer

 

 

5) Starting a computer that is not already turned on is called a:

  1. A) warm boot.
  2. B) fast load.
  3. C) cold boot.
  4. D) cold load.

Answer:  C

Diff: 1

Reference:  Starting the Computer

6) Starting a computer that is already turned on is called a:

  1. A) warm boot.
  2. B) cold boot.
  3. C) warm load.
  4. D) power on.

Answer:  A

Diff: 1

Reference:  Starting the Computer

 

7) Which of the following is the correct sequence for what happens when you turn on a computer?

  1. A) Authentication, BIOS, POST, loading the OS, system configuration, and loading the system utilities
  2. B) BIOS, POST, loading the OS, system configuration, loading the system utilities, and authentication
  3. C) POST, BIOS, system configuration, loading the OS, loading the system utilities, and authentication
  4. D) BIOS, POST, system configuration, loading the OS, loading the system utilities, and authentication

Answer:  B

Diff: 3

Reference:  Starting the Computer

 

8) One way to initiate a warm boot in Windows Vista and Windows 7 is to press which of the following keys?

  1. A) Ctrl + Boot
  2. B) Ctrl + Alt + Ins
  3. C) Ctrl + Alt + Del
  4. D) Restart

Answer:  C

Diff: 1

Reference:  Starting the Computer

 

 

9) The ________ is the central part of the OS that consists of actions the OS uses most frequently, such as starting applications.

  1. A) kernel
  2. B) core module
  3. C) critical data set
  4. D) BIOS

Answer:  A

Diff: 3

Reference:  Starting the Computer

 

10) The first OS function is:

  1. A) scanning the hard disk for errors.
  2. B) loading the applications.
  3. C) starting the computer.
  4. D) prompting the user for an ID and password.

Answer:  C

Diff: 1

Reference:  Starting the Computer

11) Which of the following is true about RAM?

  1. A) It is located on the motherboard.
  2. B) It holds all programs in use.
  3. C) It holds documents in progress.
  4. D) All of the above.

Answer:  D

Diff: 2

Reference:  Starting the Computer

 

12) The BIOS:

  1. A) is temporarily written in the computer’s
  2. B) is permanently written in the computer’s RAM.
  3. C) equips the computer with the instructions needed to accept keyboard input and display information on the screen.
  4. D) displays input and output information on a graphical screen.

Answer:  C

Diff: 3

Reference:  Step 1: The BIOS and Setup Program

 

13) While the BIOS information is visible, you can press a special key, such as F8, to access the:

  1. A) computer’s setup program.
  2. B) operating system source code.
  3. C) list of software application programs.
  4. D) kernel.

Answer:  A

Diff: 2

Reference:  Step 1: The BIOS and Setup Program

 

 

14) Which of the following checks to see that the hardware is operating appropriately?

  1. A) RAM
  2. B) BIOS
  3. C) ROM
  4. D) POST

Answer:  D

Diff: 2

Reference:  Step 2: The Power-On Self-Test

 

15) PnP is an abbreviation for which of the following terms?

  1. A) Package-and-Protect
  2. B) Peripheral-and-Plugin
  3. C) Passive-and-Predictive
  4. D) Plug-and-Play

Answer:  D

Diff: 1

Reference:  Step 4: System Configuration

16) All of the following are involved in loading the operating system EXCEPT:

  1. A) loading the kernel into the computer memory.
  2. B) adjusting the setup program in the BIOS.
  3. C) searching for the operating system.
  4. D) loading system configuration information.

Answer:  B

Diff: 2

Reference:  Step 3: Loading the Operating System

 

17) An operating system with PnP capabilities means that the system:

  1. A) automatically downloads drivers from the Internet for new peripherals that you installed.
  2. B) can record and play sound files.
  3. C) recognizes new peripherals that were attached before you turned the computer power on and then installs the appropriate drivers and checks for conflicts with other devices.
  4. D) can install the appropriate driver for a newly attached piece of hardware as long as the operating system was released before the hardware model was first produced.

Answer:  C

Diff: 2

Reference:  Step 4: System Configuration

 

18) A utility program that contains the instructions to make peripheral devices function correctly is a:

  1. A) specialized OS.
  2. B) peripheral OS.
  3. C) standalone program.
  4. D) driver.

Answer:  D

Diff: 1

Reference:  System Configuration

 

19) System utilities:

  1. A) have to be accessed through applications.
  2. B) include features such as a word-processing program.
  3. C) perform functions such as protecting your computer from viruses.
  4. D) are loaded before the operating system is loaded.

Answer:  C

Diff: 1

Reference:  Step 5: Loading System Utilities

 

20) All of the following are needed to access your computer in a multiuser environment EXCEPT a(n):

  1. A) Internet address.
  2. B) user name.
  3. C) home directory.
  4. D) password.

Answer:  A

Diff: 2

Reference:  Step 6: Authenticating Users

21) An operating system that requires you to quit one application before starting a different application is referred to as a ________ operating system.

  1. A) multitasking
  2. B) single-tasking
  3. C) foreground
  4. D) background

Answer:  B

Diff: 1

Reference:  Managing Applications

 

22) Preemptive multitasking:

  1. A) is available in older versions of Microsoft Windows.
  2. B) means that all open programs will shut down if one of the programs stops working.
  3. C) ensures all applications have fair access to the CPU.
  4. D) allows you to save your work and close the program if the program crashes.

Answer:  C

Diff: 3

Reference:  Managing Applications

 

23) If one running application invades another’s memory space, one or both will:

  1. A) crash.
  2. B) become unstable.
  3. C) Both A and B.
  4. D) Neither A nor B.

Answer:  C

Diff: 3

Reference:  Managing Applications

 

 

24) Virtual memory is an enhanced way to utilize the main memory by:

  1. A) using a part of ROM as an extension of RAM to conserve the main memory.
  2. B) using a hard disk swap file when memory is full.
  3. C) dividing data and instructions into multitasking units.
  4. D) creating pages of variable size to use when the swap file is full.

Answer:  B

Diff: 3

Reference:  Managing Memory

 

25) The ________ is responsible for managing memory.

  1. A) operating system
  2. B) embedded memory program
  3. C) buffer
  4. D) firmware

Answer:  A

Diff: 1

Reference:  Managing Memory

26) Although virtual memory enables users to work with more memory than the amount of RAM installed on the computer, ________ slows the computer down.

  1. A) memory scrubbing
  2. B) segmentation
  3. C) the operating system
  4. D) paging

Answer:  D

Diff: 2

Reference:  Managing Memory

 

27) The best way to improve the performance of your computer is to:

  1. A) increase the size of the swap file so that you can use variable pages.
  2. B) increase the use of virtual memory because the paging technique increases the speed of the memory.
  3. C) install more RAM in the computer because the random access memory works faster than the hard disk.
  4. D) install a larger hard disk in the computer so that you can store more swap files.

Answer:  C

Diff: 1

Reference:  Managing Memory

 

28) Drivers for frequently used input and output devices are:

  1. A) no longer needed if the computer has Plug-and-Play capability.
  2. B) programs that enable the user to install the system utilities faster.
  3. C) often included with most operating systems.
  4. D) interchangeable because input and output devices can now use the same information to enable them to work.

Answer:  C

Diff: 2

Reference:  Handling Input and Output

29) A boot disk:

  1. A) should be present when the computer starts up normally.
  2. B) is an emergency disk that loads the entire operating system.
  3. C) contains special files from the computer manufacturer and therefore cannot be created by the user.
  4. D) can be used for troubleshooting purposes.

Answer:  D

Diff: 1

Reference:  Troubleshooting

 

30) Miniprograms that immediately respond when an interrupt occurs are called:

  1. A) interrupt diverters.
  2. B) interrupt handlers.
  3. C) interrupt swappers.
  4. D) program exits.

Answer:  B

Diff: 3

Reference:  Handling Input and Output

31) Signals that inform the OS that something happened are:

  1. A) program defects.
  2. B) drivers.
  3. C) operating system diversions.
  4. D) interrupts.

Answer:  D

Diff: 3

Reference:  Handling Input and Output

 

32) Which of the following computer interfaces is the most popular?

  1. A) Command-line
  2. B) Menu-driven
  3. C) GUI
  4. D) Shortcut keystrokes

Answer:  C

Diff: 1

Reference:  Providing the User Interface

 

33) It is important to defragment your computer disk because fragmented files:

  1. A) are not recognized by the computer’s tracking system.
  2. B) harm the surface of the computer disk.
  3. C) reduce disk performance.
  4. D) cannot be opened because the fragmented portions are not linked.

Answer:  C

Diff: 2

Reference:  Scanning and Defragmenting Disks

 

 

34) Compression enables faster downloads, but then you have to ________ the files after downloading.

  1. A) zip
  2. B) encrypt
  3. C) decrypt
  4. D) decompress

Answer:  D

Diff: 2

Reference:  File Compression Utilities

 

35) Microsoft Windows Server 2008 is designed to support which of the following types of computing in a corporate environment?

  1. A) Mobile
  2. B) Wireless
  3. C) Client/server
  4. D) Centralized

Answer:  C

Diff: 1

Reference:  Microsoft Windows

36) System utilities are used for all of the following purposes EXCEPT to:

  1. A) protect your computer from viruses.
  2. B) serve as an Internet interface with your Internet browser.
  3. C) create backups of system and application files.
  4. D) organize and find files on your computer.

Answer:  B

Diff: 2

Reference:  System Utilities: Housekeeping Tools

 

37) ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.

  1. A) Jump list
  2. B) Windows Search
  3. C) Snap
  4. D) Pin

Answer:  B

Diff: 2

Reference:  Microsoft Windows

 

38) Many corporate chief information officers shy away from adopting Linux because:

  1. A) it doesn’t have a stable company behind it.
  2. B) it’s free.
  3. C) it’s powerful.
  4. D) it has not been properly tested.

Answer:  A

Diff: 2

Reference:  Linux

 

39) All of the following are true about embedded operating systems EXCEPT:

  1. A) they are very compact and efficient.
  2. B) examples currently in use include Windows CE and Symbian OS.
  3. C) they are designed to be used as a supplement to traditional operating systems.
  4. D) they are used in PDAs and cell phones.

Answer:  C

Diff: 3

Reference:  Embedded Operating Systems

 

40) Which of the following operating systems first offered preemptive multitasking to the user?

  1. A) Microsoft Windows 2000
  2. B) Linux
  3. C) Macintosh OS X
  4. D) UNIX

Answer:  D

Diff: 2

Reference:  UNIX

41) Which of the following is NOT true about open source software?

  1. A) Its popularity is declining.
  2. B) The basic code is free.
  3. C) Devices, such as TiVo and Amazon Kindle, use Linux-based OSs.
  4. D) None of the above.

Answer:  A

Diff: 3

Reference:  Open Source Software

 

42) System software includes the operating system and the ________ utilities.

Answer:  system

Diff: 1

Reference:  Chapter Introduction

 

43) The ________ consists of the actions that the OS uses most frequently, such as starting applications.

Answer:  kernel

Diff: 2

Reference:  Starting the Computer

 

44) The ________ is a database that stores configuration information on installed peripherals and software.

Answer:  registry

Diff: 2

Reference:  Step 4: System Configuration

 

 

45) Virtual memory involves the use of a(n) ________ file on the hard disk to store copies of pages when the memory is full.

Answer:  swap

Diff: 2

Reference:  Managing Memory

 

46) In virtual memory, programs and data are divided into fixed size units called ________.

Answer:  pages

Diff: 2

Reference:  Managing Memory

 

47) An actual interruption of an event by an interrupt signal is called an interrupt ________, or IRQ.

Answer:  request

Diff: 2

Reference:  Handling Input and Output

 

48) Icons are used in a(n) ________ user interface.

Answer:  graphical

Diff: 1

Reference:  Providing the User Interface

49) The ________ operating system focuses on ease of use, multimedia, application compatibility, and increased security.

Answer:  Windows 7

Diff: 2

Reference:  Microsoft Windows

 

50) ________ list is a new Windows 7 feature where right-clicking on an appropriate icon will result in the display of documents, pictures, songs, or Web sites used each day.

Answer:  Jump

Diff: 2

Reference:  Microsoft Windows

 

51) ________ is a new Windows 7 feature, which is a quick and easy way to resize open windows simply by dragging them to the edges of your screen.

Answer:  Snap

Diff: 2

Reference:  Microsoft Windows

 

52) The open source operating system created to work on PCs is called ________.

Answer:  Linux

Diff: 2

Reference:  Linux

 

 

53) ________ OS was initially developed for PDAs in 1996 for use with a touch screen using graphical user interfaces.

Answer:  Palm

Diff: 2

Reference:  Embedded Operating Systems

 

54) ________ OS is an open industry standard operating system for data enabled mobile phones.

Answer:  Symbian

Diff: 2

Reference:  Embedded Operating Systems

 

55) Palm ________ runs on the Palm webOS platform, is used to power Smartphones, and responds to a multitouch screen.

Answer:  Pixi

Diff: 2

Reference:  Embedded Operating Systems

 

56) Previously, Macs used a Motorola or IBM chip, but they have switched to the ________ chip.

Answer:  Intel

Diff: 2

Reference:  PC Versus Mac Versus Linux

 

57) A(n) ________ is determined by the combination of microprocessor chip and OS used by a distinct type of computer.

Answer:  platform

Diff: 2

Reference:  PC Versus Mac Versus Linux

58) Volunteers have translated versions of ________ into dozens of languages, giving computer users of all types a free alternative to buying traditional OSs.

Answer:  Linux

Diff: 2

Reference:  Open Source Software

 

59) A(n) ________ backup only copies those files that have been created or changed since the last backup.

Answer:  incremental

Diff: 2

Reference:  Backup Software

 

60) Drive imaging software creates a(n) ________ image of the entire hard disk.

Answer:  mirror

Diff: 2

Reference:  Backup Software

 

 

61) ________ software protects a computer from viruses.

Answer:  Antivirus

Diff: 1

Reference:  Antivirus Software

 

62) Antivirus software uses pattern-matching technique to examine files for telltale virus code ________.

Answer:  signatures

Diff: 2

Reference:  Antivirus Software

 

63) The system utility that you would use to organize the data stored on your computer is called a(n) ________ manager.

Answer:  file

Diff: 1

Reference:  Searching for and Managing Files

 

64) You should use a disk ________ program to reorganize data stored on a computer disk so empty sectors can be eliminated.

Answer:  defragmentation

Diff: 1

Reference:  Searching for and Managing Files

 

65) You should use an emergency or ________ disk if your computer fails to start normally.

Answer:  boot

Diff: 2

Reference:  Troubleshooting

 

66) A helpful place to look for troubleshooting guidance in Microsoft Windows is the Help and ________ utility.

Answer:  Support

Diff: 1

Reference:  Troubleshooting

67) To diagnose problems associated with system slowdown, use the Reliability and ________ Monitor.

Answer:  Performance

Diff: 2

Reference:  Troubleshooting

 

68) Application software includes all the programs that provide the infrastructure and hardware control needed for a computer, its peripheral devices, and other programs to function smoothly.

Answer:  FALSE

Diff: 2

Reference:  Chapter Introduction

 

 

69) The kernel is the central part of the OS that consists of the actions the OS uses most frequently, such as managing hardware.

Answer:  TRUE

Diff: 2

Reference:  Starting the Computer

 

70) When you first turn on or reset a PC, the CPU immediately begins to execute or work on application instructions.

Answer:  FALSE

Diff: 2

Reference:  Step 1: The BIOS and Setup Program

 

71) Menu-driven interfaces enable you to avoid memorizing keywords and symbols.

Answer:  TRUE

Diff: 2

Reference:  Providing the User Interface

 

72) Accessing data from a hard disk is much faster than accessing it from RAM memory.

Answer:  FALSE

Diff: 2

Reference:  Managing Memory

 

73) The interrupt handler is the actual interruption of an event by an interrupt signal.

Answer:  FALSE

Diff: 2

Reference:  Handling Input and Output

 

74) The option to back up to a home or network drive is only available on the Professional, Enterprise, and Ultimate editions of Windows 7.

Answer:  TRUE

Diff: 2

Reference:  Backup Software

 

75) Palm OS was initially developed for PDAs in 1996 for use with a touch screen using graphical user interfaces.

Answer:  TRUE

Diff: 2

Reference:  Embedded Operating Systems

76) Android is the operating system for mobile devices created by Google.

Answer:  TRUE

Diff: 1

Reference:  Embedded Operating Systems

 

 

77) Common embedded operating systems that are installed on handheld devices include Windows CE, Palm OS, Symbian OS, and Android.

Answer:  TRUE

Diff: 2

Reference:  Embedded Operating Systems

 

78) The Symbian OS boasts a reduced demand on the processor and memory.

Answer:  TRUE

Diff: 2

Reference:  Embedded Operating Systems

 

79) The latest version of Windows CE adds support for Code Division Multiple Access as well as more screen resolutions.

Answer:  FALSE

Diff: 3

Reference:  Embedded Operating Systems

 

80) Although open source code is a free alternative to buying traditional OSs, open source application software is not available.

Answer:  FALSE

Diff: 1

Reference:  Open Source Software

 

81) Linux-based OSs cannot be used with TiVo and Amazon Kindle.

Answer:  FALSE

Diff: 1

Reference:  Open Source Software

 

82) The terms free software and open source software are sometimes used interchangeably, but not everyone agrees that they mean the same thing.

Answer:  TRUE

Diff: 2

Reference:  Open Source Software

 

83) RAM memory is located on the motherboard and holds all programs in use and documents in progress.

Answer:  TRUE

Diff: 2

Reference:  Starting the Computer

 

84) Windows 7 and Windows Vista use Explorer as a file manager.

Answer:  TRUE

Diff: 2

Reference:  Searching for and Managing Files

 

85) A disk cleanup utility will search for and delete unusable files, along with any files in the recycle bin.

Answer:  TRUE

Diff: 2

Reference:  Scanning and Defragmenting Disks

 

86) Disk defragmentation programs are utility programs used to reorganize the disk so empty sectors are eliminated.

Answer:  TRUE

Diff: 2

Reference:  Scanning and Defragmenting Disks

 

87) Compression programs were developed by Microsoft and cannot be used independent of the Windows OS.

Answer:  FALSE

Diff: 2

Reference:  File Compression Utilities

 

88) Windows 7 is available in six versions.

Answer:  TRUE

Diff: 1

Reference:  Microsoft Windows

 

89) Many ISPs offer free antivirus protection to their subscribers.

Answer:  TRUE

Diff: 2

Reference:  Antivirus Software

 

90) Command-line user interfaces are very popular.

Answer:  FALSE

Diff: 2

Reference:  Providing the User Interface


Match the following terms to their meanings:

 

  1. A) Operating system used on most personal computers
  2. B) Operating system developed by AT&T that used preemptive multitasking
  3. C) An operating system for personal computers that uses open source software
  4. D) Many computer users prefer this operating system for its security, stability, and ease of use
  5. E) Operating system developed by Microsoft that requires the use of a command-line interface

 

91) Microsoft Windows

Diff: 2

Reference:  Exploring Popular Operating Systems

 

92) Mac OS

Diff: 2

Reference:  Exploring Popular Operating Systems

 

93) MS-DOS

Diff: 2

Reference:  Exploring Popular Operating Systems

 

94) UNIX

Diff: 2

Reference:  Exploring Popular Operating Systems

 

95) Linux

Diff: 2

Reference:  Exploring Popular Operating Systems

 

Answers: 91) A 92) D 93) E 94) B 95) C

 


Match the following terms to their meanings:

 

  1. A) Eliminates any unneeded files
  2. B) Revolutionized the software world because the basic code is free
  3. C) Coordinates the interaction between application software and computer hardware
  4. D) A utility that helps locate a file on your computer disk
  5. E) Tools used to keep your computer running smoothly

 

96) Operating system

Diff: 1

Reference:  The Operating System

 

97) Open source software

Diff: 2

Reference:  Open Source Software

 

98) System utilities

Diff: 1

Reference:  System Utilities: Housekeeping Tools

 

99) Search utility

Diff: 1

Reference:  Searching for and Managing Files

 

100) Disk cleanup utility

Diff: 1

Reference:  Scanning and Defragmenting Disks

Answers: 96) C 97) B 98) E 99) D 100) A

Computers Are Your Future, 12e (LaBerta)

Chapter 11  Programming Languages and Program Development

 

1) Which of the following is the process used to create software applications?

  1. A) Algorithms
  2. B) Pseudocoding
  3. C) Programming
  4. D) Debugging

Answer:  C

Diff: 2

Reference:  Chapter Introduction

 

2) Software applications are developed by trained experts known as:

  1. A) programmers.
  2. B) coders.
  3. C) analysts.
  4. D) debuggers.

Answer:  A

Diff: 2

Reference:  Chapter Introduction

 

3) The artificial language created to tell the computer what to do in a step-by-step manner is known as:

  1. A) codification.
  2. B) heuristics.
  3. C) programming language.
  4. D) development language.

Answer:  C

Diff: 2

Reference:  Chapter Introduction

 

4) Program instructions in their original form as written by the programmer are known as:

  1. A) flowcharts.
  2. B) heuristics.
  3. C) object code.
  4. D) source code.

Answer:  D

Diff: 1

Reference:  Compilers and Interpreters

 

 

5) The written computer instructions that programmers create are called:

  1. A) blocks.
  2. B) object modules.
  3. C) code.
  4. D) heuristics.

Answer:  C

Diff: 1

Reference:  Compilers and Interpreters

6) Which of the following types of language is representative of the first generation of programming languages?

  1. A) Assembly
  2. B) Machine
  3. C) Procedural
  4. D) Object-oriented

Answer:  B

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

 

7) Machine language is said to be machine dependent because it is dependent on the:

  1. A) version of memory.
  2. B) hard drive.
  3. C) processor.
  4. D) source code.

Answer:  C

Diff: 2

Reference:  First-Generation Languages (1GL): 0S and 1S

 

8) In assembly language, each program statement corresponds to a(n):

  1. A) object.
  2. B) instruction.
  3. C) program.
  4. D) control structure.

Answer:  B

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

 

9) Which of the following is the first step toward a true natural language interface?

  1. A) Control classes
  2. B) Continuous speech recognition
  3. C) Mnemonics
  4. D) Fast compilers

Answer:  B

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

 

 

10) Which of the following is NOT a general feature of third-generation procedural languages?

  1. A) They are translated into machine language by tools such as compilers and interpreters.
  2. B) Their use frees programmers from needing to know all the details of how the computer processes data.
  3. C) They use familiar English words such as PRINT or IF.
  4. D) The programmer describes what he or she wishes to accomplish, and the language automatically generates code to accomplish the task.

Answer:  D

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

11) When the compiler translates code, it:

  1. A) determines the number of lines of code.
  2. B) checks for the programmer identification.
  3. C) translates source code into object code.
  4. D) calculates the amount of disk space.

Answer:  C

Diff: 2

Reference:  Compilers and Interpreters

 

12) An interpreter translates code ________ at a time.

  1. A) one module
  2. B) one line
  3. C) one block
  4. D) all lines

Answer:  B

Diff: 2

Reference:  Compilers and Interpreters

 

13) Which of the following is the best definition of spaghetti code?

  1. A) It is code characterized by loops in which blocks of code repeat.
  2. B) It is code containing many GOTO statements that cause unconditional jumps from one section of code to another.
  3. C) It is code containing many IF statements in which different statements are executed, depending on the state of the data.
  4. D) It is the term for an inefficient program, often written by a novice programmer.

Answer:  B

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

 

14) Which of the following types of programming uses a set of quality standards that make programs more readable and maintainable?

  1. A) Low-level
  2. B) Unstructured
  3. C) Algorithmic
  4. D) Structured

Answer:  D

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

15) Which of the following is the purpose of information hiding in software development?

  1. A) It protects source code from the eyes of competitors.
  2. B) It frees the programmer from dealing with hardware issues such as memory management.
  3. C) It allows one programmer to use a module written by another without having to be concerned with its inner details.
  4. D) It prevents data from being inadvertently destroyed during execution of a program.

Answer:  C

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

16) With modular programming, each module requires a specific ________ and produces a specific ________.

  1. A) output; input
  2. B) input; output
  3. C) input; workflow
  4. D) workflow; output

Answer:  B

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

17) Structured query language (SQL) used in conjunction with databases is often used as an example of a ________-generation language.

  1. A) first
  2. B) second
  3. C) third
  4. D) fourth

Answer:  D

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

 

18) Which of the following types of languages are NOT tied down to step-by-step procedures?

  1. A) Low-level
  2. B) Nonregulatory
  3. C) Nonprocedural
  4. D) Evolved

Answer:  C

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

19) Which of the following programming languages is NOT one of today’s most popular programming languages?

  1. A) PHP
  2. B) Fortran
  3. C) Visual Basic
  4. D) Java

Answer:  B

Diff: 3

Reference:  Structured and Modular Languages

 

20) Much of what passes for ________ language interface is simply word matching.

  1. A) natural
  2. B) high-level
  3. C) procedural
  4. D) object

Answer:  A

Diff: 2

Reference:  Fifth-Generation Languages: Natural Language

21) The procedures contained within an object are also called:

  1. A) object code.
  2. B) source code.
  3. C) methods.
  4. D) mnemonics.

Answer:  C

Diff: 2

Reference:  Object-Oriented Programming

 

22) With object-oriented programming, information hiding is also known as:

  1. A) conversion.
  2. B) encapsulation.
  3. C) translation.
  4. D) inheritance.

Answer:  B

Diff: 1

Reference:  Object-Oriented Programming

 

 

23) An important feature of object-oriented programming is the concept of ________, a category of objects.

  1. A) module
  2. B) capsules
  3. C) class
  4. D) methods

Answer:  C

Diff: 2

Reference:  Object-Oriented Programming

 

24) Assume you developed a programming class to represent computers. Classes that represent specialized types of printers, such as Acer or Dell, would be called:

  1. A) objects.
  2. B) control classes.
  3. C) subclasses.
  4. D) super classes.

Answer:  C

Diff: 3

Reference:  Object-Oriented Programming

 

25) When using the class programming construct, a(n) ________ inherits data and functions from its parent class.

  1. A) subclass
  2. B) object
  3. C) nested
  4. D) super class

Answer:  A

Diff: 3

Reference:  Object-Oriented Programming

26) The term middleware refers to:

  1. A) rapid application development techniques.
  2. B) programs written in fourth-generation languages.
  3. C) software that makes the connection between varied applications working on multiple platforms.
  4. D) object-oriented databases that store both data and procedures to manipulate the data.

Answer:  C

Diff: 3

Reference:  Object-Oriented Programming

 

 

27) Middleware is integral to modern information technology regarding all of the following EXCEPT:

  1. A) XML.
  2. B) service-oriented architecture.
  3. C) Web services.
  4. D) interface and coding relationships.

Answer:  D

Diff: 3

Reference:  Object-Oriented Programming

 

28) Which of the following is NOT true about Visual Basic?

  1. A) Developing a user interface is the first step in Visual Basic program development.
  2. B) It is an event-driven programming language.
  3. C) Its code executes in response to user actions.
  4. D) It should not be used by novice programmers.

Answer:  D

Diff: 2

Reference:  Structured and Modular Languages

 

29) ________ is a high-level programming language, which combines the virtues of high-level programming languages with the efficiency of an assembly language.

  1. A) Fortran
  2. B) C
  3. C) C++
  4. D) Visual Basic

Answer:  B

Diff: 2

Reference:  Structured and Modular Languages

 

30) ________ is an open source object-oriented programming language, which was released in 1995.

  1. A) Ajax
  2. B) Ruby
  3. C) PHP
  4. D) XML

Answer:  B

Diff: 1

Reference:  Object-Oriented Languages

 

31) Which of the programming languages is one of the earliest and at one time, was the most widely used business programming language in the world?

  1. A) Visual Basic
  2. B) C++
  3. C) COBOL
  4. D) Java

Answer:  C

Diff: 2

Reference:  COBOL and Fortran: Historically Important

 

32) Which of the following is NOT a feature of the Java programming language?

  1. A) Java includes miniprograms called applets that are made available through a network or over the Internet.
  2. B) A program written in Java can be executed on any type of computer that has installed the Java Virtual Machine software.
  3. C) Java programs execute much faster than those written in languages such as C or C++.
  4. D) The Java language enables programmers to create programs that “write once, run everywhere.”

Answer:  C

Diff: 3

Reference:  Object-Oriented Languages

 

33) A markup language uses ________ to define the structure of the text.

  1. A) tags
  2. B) elements
  3. C) mnemonics
  4. D) control structures

Answer:  B

Diff: 2

Reference:  Web-Based Languages

 

34)  HTML is written in:

  1. A) pseudocode.
  2. B) plain text.
  3. C) JavaScript.
  4. D) C++.

Answer:  B

Diff: 1

Reference:  Web-Based Languages

 

 

35) Which of the following markup languages is used for sharing data and complex forms in a Web-based environment?

  1. A) Visual Studio.NET
  2. B) HTML
  3. C) Active
  4. D) XML

Answer:  D

Diff: 1

Reference:  Web-Based Languages

36) How many phases exist in the program development life cycle?

  1. A) Three
  2. B) Four
  3. C) Five
  4. D) Six

Answer:  D

Diff: 3

Reference:  The Program Development Life Cycle

 

37) The last phase of the program development life cycle is concerned with:

  1. A) documentation.
  2. B) coding.
  3. C) designing the solution.
  4. D) implementation and maintenance.

Answer:  D

Diff: 1

Reference:  PDLC Phase 6: Implementing and Maintaining the Program

 

38) In ________ program design, a program is designed by focusing on the main goal to be achieved and then breaking up the program into manageable components.

  1. A) object-oriented
  2. B) algorithmic
  3. C) control structure
  4. D) top-down

Answer:  D

Diff: 1

Reference:  PDLC Phase 2: Designing the Program

 

39) Program documentation might include all of the following EXCEPT:

  1. A) descriptions of error messages.
  2. B) reference documentation of program commands.
  3. C) object code.
  4. D) tutorials for new users.

Answer:  C

Diff: 2

Reference:  PDLC Phase 5: Documenting the Program

 

40) ________ programming language encapsulate information and increase code security by defining objects, as well as their components, and actions.

  1. A) Web-based
  2. B) Object-oriented
  3. C) Structured query
  4. D) Report generator

Answer:  B

Diff: 3

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

41) The vocabulary and set of rules that a programmer must learn and follow is ________.

Answer:  syntax

Diff: 1

Reference:  Programming Languages and How They Work

42) Machine language consists of ________ numbers, 1s and 0s, that directly correspond to the computer’s electrical states.

Answer:  binary

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

 

43) An easy-to-recognize abbreviation, such as MOV or ADD, used in assembly language is called a(n) ________.

Answer:  mnemonic

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

 

44) One level up from a computer’s machine language is called a(n) ________-level language.

Answer:  low

Diff: 2

Reference:  Second-Generation Languages (2GL): Using Mnemonics

 

45) ________-level languages eliminate the need for programmers to understand the intimate details of how the computer processes data.

Answer:  High

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

46) The programming specifications that are created in Java and used to create reusable, platform-independent Java components are called ________.

Answer:  javabeans

Diff: 2

Reference:  Object-Oriented Languages

 

 

47) The ultimate nonprocedural language would be ________ language, the everyday language that people speak.

Answer:  natural

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

48) The Microsoft middleware product is called ________.

Answer:  .NET

Diff: 2

Reference:  Object-Oriented Programming

 

49) Object-oriented programming enables a fast method of program development called ________ application development (RAD).

Answer:  rapid

Diff: 2

Reference:  Object-Oriented Programming

 

50) A(n) ________ language, such as English, is considered the fifth generation of programming languages.

Answer:  natural

Diff: 2

Reference:  Fifth-Generation Languages: Natural Language

51) One of the earliest high-level programming languages, ________ was used primarily for business applications.

Answer:  COBOL

Diff: 2

Reference:  COBOL and Fortran: Historically Important

 

52) The ________ language was used heavily until the mid-1990s as the language of choice for the Department of Defense.

Answer:  Ada

Diff: 2

Reference:  Structured and Modular Languages

 

53) WML is an acronym that stands for ________ Markup Language.

Answer:  Wireless

Diff: 2

Reference:  Web-Based Languages

 

54) Simple programs that control action or feedback on Web pages are ________.

Answer:  scripts

Diff: 2

Reference:  Web-Based Languages

 

 

55) ________ is a programming language developed by AT&T’s Bell Labs in the 1970s that combines features of both high- and low-level languages.

Answer:  C

Diff: 2

Reference:  Structured and Modular Languages

 

56) A general purpose, server-side, open source, cross-platform scripting language used primarily to make dynamic Web sites is known by the acronym ________.

Answer:  PHP

Diff: 2

Reference:  Web-Based Languages

 

57) ________, short for JavaScript Object Notation, is a text-based, human-readable technique for representing simple data structures and objects.

Answer:  JSON

Diff: 2

Reference:  Web-Based Languages

 

58) Standardizing HTML and XHTML, as well as forcing the separation of content from formatting, is the responsibility of the World Wide Web Consortium, which is known by the acronym ________.

Answer:  W3C

Diff: 2

Reference:  Web-Based Languages

 

59) IF-THEN-ELSE and DO-WHILE are examples of programming ________ structures.

Answer:  control

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

60) Syntax and logic errors are collectively known as ________.

Answer:  bugs.

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

 

61) The process of eliminating logic and syntax errors is known as ________.

Answer:  debugging.

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

 

62) A(n) ________ error is a mistake the programmer makes in designing the solution to a problem.

Answer:  logic

Diff: 2

Reference:  PDLC Phase 4: Testing and Debugging the Program

 

 

63) ________ Modeling Language (UML) is an open method used to illustrate and document the components of an object-oriented software system under development.

Answer:  Unified

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

 

64) A stylized form of writing that is used to describe a program’s logic is called ________.

Answer:  pseudocode

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

 

65) Visual Basic uses the ________-driven programming language in which code modules are written to execute in response to user actions.

Answer:  event

Diff: 2

Reference:  Structured and Modular Languages

 

66) WML is a specialized form of XML used by wireless devices.

Answer:  TRUE

Diff: 2

Reference:  Web-Based Languages

 

67) Inheritance refers to an object’s capacity to replicate itself.

Answer:  FALSE

Diff: 2

Reference:  Object-Oriented Programming

 

68) Machine language consists of binary numbers-0s and 1s.

Answer:  TRUE

Diff: 2

Reference:  First-Generation Languages (1GL): 0S and 1S

 

69) Procedural languages do NOT require the programmer to specify the steps in the program.

Answer:  FALSE

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

70) A compiler translates source code into object code.

Answer:  TRUE

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

71) Report generators and query languages are examples of nonprocedural languages.

Answer:  TRUE

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

72) Natural language is the everyday language that people speak.

Answer:  TRUE

Diff: 2

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

73) Object-oriented programming is a technique similar to structured programming.

Answer:  FALSE

Diff: 2

Reference:  Object-Oriented Programming

 

74) An object is the combination of data and methods.

Answer:  TRUE

Diff: 2

Reference:  Object-Oriented Programming

 

75) COBOL is the least used business programming language.

Answer:  FALSE

Diff: 2

Reference:  COBOL and Fortran: Historically Important

 

76) BASIC is widely accepted as a teaching language in academia.

Answer:  FALSE

Diff: 2

Reference:  Structured and Modular Languages

 

77) Another term for information hiding is encapsulation.

Answer:  TRUE

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

78) Ada is an event-driven programming language.

Answer:  FALSE

Diff: 2

Reference:  Structured and Modular Languages

 

79) An event-driven programming language is designed to execute in response to user actions.

Answer:  TRUE

Diff: 2

Reference:  Structured and Modular Languages

80) C is a language that combines the benefits of high-level programming languages with the efficiency of an assembly language.

Answer:  TRUE

Diff: 2

Reference:  Structured and Modular Languages

 

 

81) Agile methods encourage teamwork, self-organization, and accountability.

Answer:  TRUE

Diff: 2

Reference:  Object-Oriented Languages

 

82) A programmer must write code that describes an object when using RAD.

Answer:  FALSE

Diff: 1

Reference:  Object-Oriented Languages

 

83) Java is considered to be an object-oriented, high-level, cross-platform programming language.

Answer:  TRUE

Diff: 1

Reference:  Object-Oriented Languages

 

84) Middleware is software that enables access to objects and queries them about what types of data they contain.

Answer:  TRUE

Diff: 2

Reference:  Object-Oriented Programming

 

85) Fortran is used to solve scientific, mathematical, and engineering problems.

Answer:  TRUE

Diff: 2

Reference:  COBOL and Fortran: Historically Important

 

86) An algorithm is another term for detailed specification.

Answer:  FALSE

Diff: 2

Reference:  PDLC Phase 2: Designing the Program

 

87) The program specification defines the detailed coding that is to take place.

Answer:  FALSE

Diff: 1

Reference:  PDLC Phase 1: Defining the Problem

 

88) An important feature of object-oriented programming is the concept of class.

Answer:  TRUE

Diff: 1

Reference:  Object-Oriented Programming

 

89) Joint application development is a development method that involves the end user in the planning stage.

Answer:  TRUE

Diff: 2

Reference:  Object-Oriented Programming

90) Information hiding requires the author of one module to be aware of the details of other modules.

Answer:  FALSE

Diff: 2

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

Match the following programming language generations to their descriptions:

 

  1. A) Includes report generators and query languages
  2. B) A high-level language that includes familiar English words
  3. C) Includes assembly language
  4. D) Includes machine language
  5. E) Includes natural language

 

91) First

Diff: 1

Reference:  First-Generation Languages (1GL): 0S and 1S

 

92) Third

Diff: 1

Reference:  Third-Generation Languages (3GL): Programming Comes of Age

 

93) Fifth

Diff: 1

Reference:  Fifth-Generation Languages: Natural Language

 

94) Second

Diff: 1

Reference:  Second-Generation Languages (2GL): Using Mnemonics

 

95) Fourth

Diff: 1

Reference:  Fourth-Generation Languages (4GL): Getting Away From Procedure

 

Answers: 91) D 92) B 93) E 94) C 95) A


Match the following languages to their descriptions:

 

  1. A) Used on Web pages
  2. B) Recent cross-platform language
  3. C) Suited for mathematical problem solving
  4. D) Used for fast development of Windows applications
  5. E) Used primarily by the Department of Defense

 

96) Ada

Diff: 2

Reference:  Structured and Modular Languages

 

97) Java

Diff: 2

Reference:  Object-Oriented Programming

 

98) Visual Basic

Diff: 2

Reference:  Structured and Modular Languages

 

99) Fortran

Diff: 2

Reference:  COBOL and Fortran: Historically Important

 

100) HTML

Diff: 2

Reference:  Web-Based Languages

 

Answers: 96) E 97) B 98) D 99) C 100) A

Reviews

There are no reviews yet.

Be the first to review “Computers Are Your Future 12th Edition by LaBerta – Test Bank”

Your email address will not be published. Required fields are marked *