All In One Flashcards

(166 cards)

1
Q

A programmer has been asked to lead a project that uses AI to search for patterns in WiFi signals to improve efficiency and range. The programmer will use the software development lifecycle ( SDLC) as a model for design and implementation. Which step is the programmer in when choosing a programming language and typing the code?

A

Code the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to the state of a process when it’s being created?

A

New

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the CPU scheduling method in which a process is not interrupted and is allowed to finish before another process starts?

A

First come, first serve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement describes a characteristic of sequential file access?

A

The file is seen as linear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is an example of integer data type?
A) 3.14
B) “hello”
C) true
D) 42

A

42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data type is used to represent textual data?

A

String

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which variable name is valid in most programming languages?

A

Variable_123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement correctly assigns the value 10 to the variable X?
A) x==10
B) 10 =x
C) x=>10
D) x=10

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used for iteration in programming?

A

While loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the result of the expression 2+3x4?

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which operator has the highest precedence?

A

X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which value is a floating-point number?
A) “3.14”
B) 3.14
C) 42
D) true

A

3.14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the result of the expression (2+3)x4?

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a linked list?

A

A collection of elements, each containing a reference to the next element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What best describes a stack?

A

Last-in, first-out (LIFO) structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary characteristic of a queue?

A

There is a first-in, first-out (FIFO) access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a subprogram?

A

A sequence of program instructions that Perform a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In psuedocode, how would you call a function named CalculateSum with two parameters a and b?

A

CalculateSum ( a,b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary purpose of using subprograms in a program?

A

To allow for code reuse and better organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which operation is used to add an element to the top of a stack?

A

Push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which scenario is a stack most suitable for?

A

Storing undo operations in a text editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the main purpose of object- oriented programming ( OOP)?

A

To organize code into reusable components called objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement describes a class in OOP?

A

A blueprint for creating objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encapsulation in OOP?

A

The practice of keeping data and methods that manipulate the data in a single unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which feature of OOP allows programmers to create new classes based on existing classes?
Inheritance
26
What is a polymorphism in OOP?
The ability of different objects to respond to the same method in different ways
27
Which keywords is used in many programming languages to create a new instance of a class?
New
28
What dues the term "inheritance hierarchy" referring to in OOP?
The organization of classes into a tree structure based on inheritance relationships
29
What does the term "object" refer to in OOP?
An instance of a class containing attributes and methods
30
Which principle of OOP is demonstrated by restricting access to certain parts of an object?
Encapsulation
31
What dues the ter "abstraction" refer to in OOP?
The practice of hiding the complex implementation details and showing only the necessary features
32
Which valve is stored as an integer in computer programming? A) 21 B) -306.5 C) "O" D) true
21
33
Which coding construct repeats a task while a condition is true?
Iteration
34
How are items accessed in a stack?
The last item to be added becomes first item removed
35
A web browser puts websites into a viewing history log and accesses the most recent when the back button is clicked. Which data structure would be appropriate for this situation?
Stack
36
What is the relationship between a parameter and an argument?
A parameter is a temporary variable in a function that receives the actual value of an argument
37
Which programming language is considered to be a declarative language?
Lisp
38
What does computational thinking involve?
Solving problems using a logical steps?
39
What is the software development lifecycle ( SDLC) primarily concerned with?
Managing the software development process
40
What do problem-solving methodologies in computational thinking emphasize?
Approaching problems systematically
41
What are the four steps of George poly as problem-solving method?
Identify, research, develop, evaluate
42
Which step involves coming up with possible strategies to solve the problem?
Devising a plan
43
What is the purpose of maintenance phase in the computer problem-solving process?
To ensure the continued functionality of the software
44
Which step in George Polya's problem solving process involves understanding the context of the problem, identifying what is being a seed, and recognizing any constraints?
Understanding the problem
45
Hannah is troubleshooting issue where a program crashes on startup. She needs to identify the root cause of the problem and find a solution. Which step in George Polya’s problem-solving process involves analyzing the software issue to determine the cause and develop a solution?
Understanding the problem
46
Ahmed needs to optimize the performance of a web application that is experiencing slow loading times. Which step in George Polya’s problem solving process involves analyzing the factors contributing to the slow loading times and devising strategies to improve performance?
Devising a plan
47
Mei need sto design an algorithm to sort a large dataset efficiently. Which step in George Polya’s problem-solving process involves understanding the requirements of the sorting algorithm and devising a plan to implement it?
Devising a plan
48
What is the primary goal of the IEEE and ACM codes of ethics?
To guide ethical decision-making and conduct in the computing profession
49
Which of the following principles is emphasized in the ACM code of ethics?
Integrity
50
What is one of the key values promoted by the IEEE and ACM codes of ethics?
Acting in the public interest
51
What is one of the fundamental principles outlined in the ACM code of ethics?
Avoiding harm to others
52
Which of the following is a key aspect of the IEEE code of ethics?
Improving technical competence
53
What does the IEEE code of ethics encourage regarding conflicts of interest?
Prioritizing professional obligations over personal interests
54
To meet a light deadline,Talia,a software engineer, knowingly writes code that contains a security flaw, risking user data privacy. Which ethical principle does this violate?
Integrity
55
Daniel, a software engineer, releases a new product without adequate testing, leading to widespread failures. Which ethical principle is violated?
Quality of work
56
Maya, a data analyst, manipulates data to produce more favorable outcomes for a client. Which ethical principles is she violating?
Transparency
57
Charlotte, a network engineer, causes a security flaw in her company's product and then a refuses to take responsibility for it when it is discovered a supervisor. Which ethical principle is compromised?
Accountability
58
What is intellectual property? (IP)
Property created through intellectual activity
59
Which concept is a type of intellectual property protection?
Patents
60
What does IP licensing allow?
The right to use intellectual property under defined conditions
61
What is an example of IP theft?
Downloading software without a license
62
Why is cybercrime?
Downloading software without a license
63
What can be a consequence of cybercrime?
Legal penalties and fines
64
Maria,a software developer, copies a substantial portion of code from an open source project into his commercial software without proper attribution. Which ethical issue does this scenario represent?
Intellectual property theft
65
Alexuses his colleagues log-in credentials to access confidential project files without permission because he is various about the progress. Which ethical issue does this scenario represent?
Unauthorized access
66
Sophia, a social media influencer, creates a fake account to harass a rival influencer by posting negative comments and spreading false information. Which ethical issue does this scenario represent?
Cyber bullying
67
During a software development project, Michael, finds a way to exploit a vulnerability in a competitors product to gain unauthorized access to their system. Instead of reporting the vulnerability, he uses it to extract sensitive information. Which ethical issue does the scenario represent?
Cybercrime
68
A programming company has been hired to write code that will send secure messages from one device to another. The Company policy is to follow the software development lifecycle ( SDLC) model for production. Which step will the team expect to go through during the course of this process?
Test the program
69
A programmer has been asked to lead a project that uses artificial intelligence to search for patters in Wi-Fi signals to improve efficiency and range. The programmer will use the software development lifecycle (SDLC) as a model for design and implementation. Which step is the programmer in when outlining the steps that the program will go through?
Plan the logic
70
A computer scientist is writing a computer application that will manage financial records for small businesses. The computer scientist is following the software development lifecycles (SDLC) model and just completed the step, "understand the problem." which step is next in the SDLC?
Plan the logic
71
What does a technology company need to commit to if adopting the association of computing machinery (ACM) code of ethics?
Perform work only in areas of competence
72
Which situation represents a violation of the codes of ethics for both the association of computing machinery (ACM) and the institute of electrical and electronic engineers (IEEE)?
One of the division heads assigns work to employees that is outside their area of competence.
73
What is one situation that illustrates extortion?
A person hack into a university's servers, locks them down, and will only unlock them for a larger random.
74
Which statement describes an array?
A collection of elements of the same type stored at contiguous memory locations
75
Which statement describes a record in programming?
A data structure that holds multiple values of different data types
76
Which data structure is best suited for storing a collection of different data types?
Record
77
What is a common characteristic of both arrays and records?
Both can store multiple values
78
What is the primary advantage of binary search over sequential (linear) search?
It is faster for large data sets
79
Which search algorithm would course on an unsorted list?
Sequential (linear) search
80
Which sorting algorithm repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order?
Bubble
81
Which statement describes linear search?
It checks each element one by one.
82
Which statement is true about binary search?
It requires the list to be sorted
83
Which type of sorting algorithm repeatedly finds the minimum element and moves it to the beginning of the list?
Selection
84
Which flowchart symbolis used toindicate the start or end of a process flow?
Oval
85
Which flowchart symbol is used to represent a decision or conditional branch?
Diamond
86
Which flowcharts symbol is used to represent input or output operations?
Parallelogram
87
How would one express a pseudocode statement to divide a variable total by another variable count?
Total /count
88
Which pseudocode operation converts an integer variable age to floating-point number?
Float(age)
89
How would one write a pseudocode statement to add 10 to the variable value?
Value +10
90
What is the result of dividing 7 by 2 in an integer division?
3
91
Which pseudocode operation represents a type conversion from a floating-point number toan integer?
Int(num)
92
Which statement describes a sequence structure in pseudocode?
Executing actions one after another in order
93
What is the purpose of a selection structure in pseudocode?
To choose different paths based on conditions
94
Which statement is an example of a dual-alternative if statement?
If (condition) then...else
95
Which keyword typically used to represent the end of a selection structure in pseudocode?
End if
96
Which statement best describes a loop structure in pseudocode?
Repeating a set of actions until a condition is met
97
What is the primary purpose of a loop body in pseudocode?
To contain the statements repeated in a loop
98
Which keyword is typically used to start a while loop in pseudocode?
While
99
Which statement describes a nested structure?
Contains another structure within it
100
What is the main advantage of using a nesting structure in pseudocode?
It allows for more complex decision-making and iterations
101
Which pseudocode statement is an example of a single-alternative if statement?
If (condition) then
102
What is the name of the algorithm that sorts a list by repeatedly comparing and swapping adjacent items, with each pass through the list stopping at one end?
Bubble sort
103
Which describes the programming structure that executes a process a specific number of times?
Count-controlled loop
104
What is the pseudocude that will convert the integer ato a floating point number?
myFloat x = float(a)
105
Which piece of pseudocode correctly calculates the integer result of dividing the integer b by the integer f?
B//f
106
Consider the following code. If (myYear > 1900) print "continue" ELSE print "error" what does the code do?
It prints continue if the value ofmyYear is greater than 1900 and error otherwise.
107
Set temp to val_1 Set val_1 to val_2 set val_2 to temp. What is accomplished by the pseuducode?
It swaps the values of val_1 and val_2
108
How does an operating system (OS) manage system performance?
By optimizing the use of CPU, memory, and storage resources
109
What is the primary purpose of memory management in an operating system?
To efficiently allocate and manage system memory
110
Which task or tasks are part of process management in an operating system?
Creating, executing, and terminating process
111
What is the main goal of CPU scheduling in an operating system?
Determining the order in which the CPU executes processes
112
Which technique does an operating system use to extend physical memory by using disk space?
Virtual memory
113
Which of the following describes a process in the context of an operating system?
A program in execution
114
Which CPU scheduling algorithm selects the process with the smallest execution time remaining?
Shortest job next ( SJN)
115
Which state is a process in when it has completed its execution?
Termination
116
Which CPU scheduling algorithm assigns a fixed time slice to each processinqueue?
Round-robin ( RR)
117
Which statement describes paging in memory management?
Allocating fixed-sized blocks of memory
118
Which statement describes the purpose of a file system in an operating system?
To organize and manage data storage on devices
119
Which file extensions is typically associated with a text file?
•Txt
120
In a hierarchical file system, what is the top- level directory called?
Root directory
121
In a hierarchical file system, what is a subdirectory?
A directory with in another directory
122
Which statement describes a relative path?
The path to a file or directory relative to the current working directory
123
What is the primary goal of disk scheduling algorithms?
To minimize seek time and maximize throughput
124
Which disk scheduling algorithm selects the request closest to the current head position?
Shortest seek time first ( SSTF)
125
What is the main disadvantage of the first-come,first-served (FCCs) disk scheduling algorithm?
High seek time
126
Which disk scheduling algorithm minimizes the total seek time by scanning in both directions across the disk?
Elevator (SCAN)
127
What is an operating system responsible for?
It manages computer resources, such as memory and external devices
128
What is the name of the state of a process when it is standing by for another process to send a signal that it may continue?
Waiting
129
What method is a nonpreemptive approach to CPU scheduling?
First come, fist serve (FCFS)
130
What is one operation common to most file systems?
Create
131
What is the name of a disk scheduling technique?
First come first serve (FCFS)
132
What is the primary function of the CPU in a computer?
Perform calculations and execute instructions
133
Which component is considered volatile memory?
RAM
134
Which storage device typically offers the fastest data access speed?
Solid state drive (SSD)
135
Which component is directlyresponsible for executing the instructions of a computer program?
CPU
136
Which memory component is an example of nonvolatile memory?
ROM
137
Which type of memory is used to temporarily store data the CPU needs while performing tasks?
RAM
138
Which term refers to he number of bits a computer can process at one time?
Bus width
139
What is the primary function of the ALU in a CPU?
Performing arithmetic and logical operations
140
What is the main function of the control unit within the CPU?
Manage and coordinate the activities of the computer
141
Which type of storage device typically offers the largest capacity?
HDD
142
What is the primary function of router in a network?
Direct data traffic between different network
143
Which protocol is primarily used for transmitting web pages over the internet?
HTTP
144
What is an IP address?
A unique identifier assigned Te each device on a network
145
What is an open system?
A system that uses standardized protocols for interoperability
146
What does the domain name system (DNS) do?
Translates domain names to IP addresses
147
Which protocol ensures reliable transmission of data over the internet?
TCP
148
Which type of network topology connects all devices to a central hub?
Star topology
149
What does the term "bandwidth" refer to in networking?
The maximum rate of data transfer across a network path
150
Which lager of the OSI modelis responsible for establishing managing, and terminating connects between applications?
The session layer
151
What is the purpose of a firewall in a network?
To prevent unauthorized access to or from a private network
152
What is a key characteristic of a supercomputer?
High-speed processing for complex tasks
153
Which device is an example ofan embedded computer?
Washing machine control panel
154
What is a recent hardware trend in personal computing?
Increasing use of multicorce processors
155
Which statement describes the internet of things (IoT)?
A system of interconnected devices that can communicate and exchange data
156
Which type of computer do large organizations typically use for critical applications and bulk data processing?
Mainframe
157
Which device is an example of an IoT? A) desktop computer (PC) B) smart thermostat C) external hard drive D) printer
B) smart thermostat
158
What distinguishes a server from a personal computer (PC)?
Servers manage network resources and provide services to multiple users
159
What is the primary benefit of using multicore processors in modern computers?
Enhanced processing performance for multitasking and parallel processing
160
What describes a server farm?
A collection of interconnected severs working together
161
What is a common use for graphic processing units (GPUs) in modern computing?
Enhancing video and image processing
162
What is one component is considered a major part of the Von Neumann architecture?
Arithmetic /logic unit
163
What is true about reading only memory (ROM)?
It is used to store instructions that the computer needs to start up
164
How is a ring topology set up in a local area network (LAN)?
All nodes are connected to exactly two other nodes in a circular data path?
165
The location of a computer is given either falcon.csc.computersoft.org or 205.39.155.18. What part of this information is known as the hostname?
Falcon.Csc.computersoft.org
166
What is the name for a computer placed directly inside another electronic device designed for a specific purpose?
Embedded computer