Unit 1 Review Flashcards Preview

Computer Programming > Unit 1 Review > Flashcards

Flashcards in Unit 1 Review Deck (40):
1

What did Ada Byron mean when she said that the Analytical Engine could never "originate anything"?
A. A machine could not think.
B. A machine could no do calculations.
C. A machine could not talk.
D. A machine could not make a decision.

A. A machine could not think

2

Which category of programming languages has the most abstraction from the hardware?
A. High level
B. Low Level
C. Assembly Language
D. Machine Language

A. High Level

3

To determine the level of the computer language, compare the language used to the:
A. modifications the language will handle.
B. computer hardware being used.
C. number of variables in the language.
D. abstractions the language contains from machine code of 0s and 1s.

D. abstractions the language contains from machine code of 0s and 1s.

4

The hexadecimal number A41 is ________ in binary.

A. 10000100001
B. 01100100001
C. 101001000001
D. None of the options.

C. 101001000001

5

The binary number 10111 is ______ in decimal.
A. 4
B. 23
C. none of the options
D. 15

B. 23

6

________ is another name for Decimal.
A. Base 2
B. Base 8
C. Base 10
D. Base 16

C. Base 10

7

What computer was sold to US Census Bureau in 1951?
A. ENIAC
B. UNIVAC
C. EDVAC
D. Mark I

B. UNIVAC

8

Using a program to record transactions, phone calls and other personal information is what type of ethical consideration?

A. Privacy
B. Online Profiling
C. Netiquette
D. Phishing

A. Privacy

9

What made it possible to build the microcomputer (PC)?

A. The transistor
B. The development of stored memory
C. The Integrated Circuit
D. The microprocessor

D. The microprocessor

10

The F in hexadecimal is equal to
A. 11
B. 10
C. 15
D. 16

C. 15

11

The information posted on the Social Security Administration website for public view and access is incompliance with which legislation?

A. Electronic Freedom of Information Act of 1996
B. Privacy Act of 1974
C. Electronic Communications Privacy Act of 1986
D. Safety and Freedom through Encryption Act of 1999

A. Electronic Freedom of Information Act of 1996

12

Who wrote the first computer program?
A. Charles Babbage
B. Herman Hollerith
C. Stephen Jobs
D. Ada Byron

D. Ada Byron

13

The decimal number 10 is equal to ________ in binary?
A. 0010
B. 1010
C. 1111
D. 1001

B. 1010

14

How would a programming language that allows programs to run on any operating system be classified?

A. High Level
B. Very low level
C. Medium Level
D. Low Level

A. High Level

15

If a zero is shown in binary, it represents:
A. On
B. Both 0 and 1
C. Off
D. Neither 0 nor 1

C. Off

16

How does Visual Basic differ from Basic?

A. Visual Basic is an object-oriented language and Basic is not.
B. Basic is a newer language than Visual Basic.
C. Basic is a high level language and Visual Basic is low level.
D. Visual Basic is easy to learn and Basic is not.

A. Visual Basic is an object-oriented language and Basic is not.

17

Digits in binary are also know as bits.

A. False
B. True

B. True

18

What type of code is directly understood by the CPU?

A. Machine Code
B. C
C. Abstract Code
D. Assembly Language

A. Machine Code

19

How many KB in 1 MB?
A. 1 KB
B. 1000 KB
C. 924 KB
D. 1024 KB

D. 1024 KB

20

What base number system is also known as hexadecimal?

A. 16
B. 8
C. none of the options
D. 10

A. 16

21

The decimal number 15 equals ________ in binary.
A. 0000
B. 1111
C. 1110
D. 0111

B. 1111

22

Why were magnetic tapes used to replace punch cards in Second Generation computers?
A. Increased computer memory
B. Increased manual labor
C. Increased cost of production
D. Increased reliability

D. Increased reliability

23

What sparked the second generation computers?
A. The invention of the first computer language.
B. The invention of the Integrated Circuit
C.The invention of machine language
D. The invention of the transistor

D. The invention of the transistor

24

The use of a hexadecimal numbering system in computers allows the computer to:
A. represent small amounts of information in a large database.
B. store data with little room for error.
C. use less disk space in storing data.
D. convert small numbers quickly.

C. use less disk space in storing data.

25

Which number system utilizes only two digits?
A. Octal
B. Decimal
C. Binary
D. Hexadecimal

C. Binary

26

Which describes a program designed to reproduce itself by copying itself into other programs without theuser's knowledge?
A. A bug
B. A virus
C. An infection
D. A reproduction

B. A virus

27

All of the following were developed in the 1990's except:
A. Python
B. C
C. Java
D. PHP

B. C

28

A computer program that stores the names of 5,000 customers for a business would MOST LIKELY bewritten in what language?
A. Pascal
B. SQL
C. BASIC
D. COBOL

B. SQL

29

The binary number 1000110 equals ________ in hexadecimal.

A. 46
B. 12
C. 16
D. D3

A. 46

30

The Stepped Reckoner was never mass produced because:

A. they frequently jammed or malfunctioned causing reliability of data issues.
B. the raw materials in mechanical devices were hard to find.
C. they broke when used causing cost production issues.
D. no investor saw a need for these types of devices.

A. they frequently jammed or malfunctioned causing reliability of data issues.

31

Which statement BEST describes why the binary system is one of the four numbering systems used in computers?
A. The most significant digit to a computer is 0 so it is open to the flow of electricity.
B. Computers do not have a brain so programmers must keep it simple in making conversions.
C. Computers can only process electronic pulses which are equivalent to on and off pulses of electricity.
D. Four digits can be used to show a large range of information by using the power of 2.

B. Computers do not have a brain so programmers must keep it simple in making conversions.

32

The following is an example of what?
8B542408 83FA0077 06B80000
A. compiler code
B. binary code
C. machine code
D. assembly language

C. Machine Code

33

Which act requires commercial web sites that collect personal information from children under the age of 13to obtain parental consent?
A. Electronic Communications Privacy Act of 1986
B. Consumer Credit Reporting Reform Act of 1996
C. Right to Financial Privacy Act of 1978
D. Children's Online Privacy Protection Act of 1988 (COPPA)

D. Children's Online Privacy Protection Act of 1988 (COPPA)

34

A bit is

A. a single 0 or 1 in the binary code.
B. eight 0s or 1s.
C. equal to 64K of RAM
D. a person’s name stored in memory.

A. a single 0 or 1 in the binary code.

35

What characteristic of electro-mechanical devices positively impacted their success?
A. Binary numbers
B. Logic patterns
C. Electricity use
D. Magnetic tape use

C. Electricity use

36

Which is a netiquette guideline?
A. Never change your password
B. Access the account of another user
C. Do not attempt to access the account of another user without authorization
D. Share your password

C. Do not attempt to access the account of another user without authorization

37

101 in base 2 equals ______ in decimal.
A. 6
B. 5
C. 9
D. 4

B. 5

38

When comparing third and fourth generation computers, which statement BEST summarizes the comparison?
A. Fourth generation computers completely overhauled the third generation use of vacuum tubes.
B. Third generation computer's silicon wafers led to a waffle housing of computers and reduced heat generation in fourth generation computers.
C. The inventions of integrated circuits in third generation computers led to the development of microprocessors in the fourth generation computers.
D. Fourth generation computers function primarily the same way as third generation computers with the exception of the larger size of computing boards.

C. The inventions of integrated circuits in third generation computers led to the development of microprocessors in the fourth generation computers.

39

Which statement BEST describes how World War II impacted computer development?
A. The use of vacuum tubes in visual displays during WWI led to the use of tubes in computers.
B. The need for accuracy of military calculations for the trajectory of artillery shells led government to develop a computer.
C. The use of wiring in WWI communication instruments led to a development of computers with wire houses.
D. The need for navigational systems to steer troops to landings led to the development of sophisticated computers.

B. The need for accuracy of military calculations for the trajectory of artillery shells led government to develop a computer.

40

The need to perform what tasks led to the development of the first mechanical devices?
A. Mathematical computations
B. Decision structures
C. Logic
D. Sequencing

A. Mathematical computations