CompSci Final Exam Flashcards
(38 cards)
Machine language is a high-level programming language.
False
One of the benefits of machine language is that it uses natural language and mathematical notations.
T/F
False
Clients cannot perform local computations without access to the network.
Fasle
Assemblers,____ and interpreters are all exampels of language services.
Compilers
for a program to run on a naked machine, it must be represented in binary.
True
A Von Neumann computer without any helpful user-oriented features is called a(n)._____ machine.
naked
The_____ hides from the user the messy details of the underlying hardware.
Interface
In__________, a single instruction provides multiple instructions in __________
high-level programming, machine language
A(n)______ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
conditional
Which language does NOT require a semicolon to terminate an executable program statement
Python
The software translator used to convert our high-level language instructions into machine language instructions is called a(n)________
Complier
High-level programming languages were created to overcome the deficiencies of________ language.
assembly
Assembly language programs are _____ Specific
Machine
Newer languages such as Java and C# were developed specifically to run on a variety of hardware platforms without the ned for separate ________ for each type of machine.
Complier
The __________ computer architecture is characterized by sequential fetch- decode-execute cycles.
Von Neumann
Each language we learned about uses its own notation (-, l, or #) ot denote aprogram comment.
true
A LAN connects devices that are not ni close proximity but rather are across town, across the country, or across the ocean.
False
_________is a low-power wireless standard used to communicate between devices located quite close to each other.
Bluetooth
A ________ makes internetwork connections and provides routing between different WANs.
Gateway
is the term for the separation of a service from the entity (or entities) providing that service.
Virtualization
The most common public-key encryption algorithm is ____
RSA
A_______ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.
Caesar
The ________ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.
hash function
An asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver.
T/F
False