All In One Flashcards
A programmer has been asked to lead a project that uses AI to search for patterns in WiFi signals to improve efficiency and range. The programmer will use the software development lifecycle ( SDLC) as a model for design and implementation. Which step is the programmer in when choosing a programming language and typing the code?
Code the program
Which term refers to the state of a process when it’s being created?
New
What is the name of the CPU scheduling method in which a process is not interrupted and is allowed to finish before another process starts?
First come, first serve
Which statement describes a characteristic of sequential file access?
The file is seen as linear.
Which is an example of integer data type?
A) 3.14
B) “hello”
C) true
D) 42
42
Which data type is used to represent textual data?
String
Which variable name is valid in most programming languages?
Variable_123
Which statement correctly assigns the value 10 to the variable X?
A) x==10
B) 10 =x
C) x=>10
D) x=10
What is used for iteration in programming?
While loop
What is the result of the expression 2+3x4?
14
Which operator has the highest precedence?
X
Which value is a floating-point number?
A) “3.14”
B) 3.14
C) 42
D) true
3.14
What is the result of the expression (2+3)x4?
20
What is a linked list?
A collection of elements, each containing a reference to the next element.
What best describes a stack?
Last-in, first-out (LIFO) structure
What is the primary characteristic of a queue?
There is a first-in, first-out (FIFO) access
What is a subprogram?
A sequence of program instructions that Perform a specific task
In psuedocode, how would you call a function named CalculateSum with two parameters a and b?
CalculateSum ( a,b)
What is the primary purpose of using subprograms in a program?
To allow for code reuse and better organization.
Which operation is used to add an element to the top of a stack?
Push
Which scenario is a stack most suitable for?
Storing undo operations in a text editor
What is the main purpose of object- oriented programming ( OOP)?
To organize code into reusable components called objects
Which statement describes a class in OOP?
A blueprint for creating objects
What is encapsulation in OOP?
The practice of keeping data and methods that manipulate the data in a single unit
Which feature of OOP allows programmers to create new classes based on existing classes?
Inheritance
What is a polymorphism in OOP?
The ability of different objects to respond to the same method in different ways
Which keywords is used in many programming languages to create a new instance of a class?
New
What dues the term “inheritance hierarchy” referring to in OOP?
The organization of classes into a tree structure based on inheritance relationships
What does the term “object” refer to in OOP?
An instance of a class containing attributes and methods
Which principle of OOP is demonstrated by restricting access to certain parts of an object?
Encapsulation
What dues the ter “abstraction” refer to in OOP?
The practice of hiding the complex implementation details and showing only the necessary features
Which valve is stored as an integer in computer programming?
A) 21
B) -306.5
C) “O”
D) true
21
Which coding construct repeats a task while a condition is true?
Iteration
How are items accessed in a stack?
The last item to be added becomes first item removed
A web browser puts websites into a viewing history log and accesses the most recent when the back button is clicked. Which data structure would be appropriate for this situation?
Stack
What is the relationship between a parameter and an argument?
A parameter is a temporary variable in a function that receives the actual value of an argument
Which programming language is considered to be a declarative language?
Lisp
What does computational thinking involve?
Solving problems using a logical steps?
What is the software development lifecycle ( SDLC) primarily concerned with?
Managing the software development process
What do problem-solving methodologies in computational thinking emphasize?
Approaching problems systematically
What are the four steps of George poly as problem-solving method?
Identify, research, develop, evaluate
Which step involves coming up with possible strategies to solve the problem?
Devising a plan
What is the purpose of maintenance phase in the computer problem-solving process?
To ensure the continued functionality of the software
Which step in George Polya’s problem solving process involves understanding the context of the problem, identifying what is being a seed, and recognizing any constraints?
Understanding the problem
Hannah is troubleshooting issue where a program crashes on startup. She needs to identify the root cause of the problem and find a solution. Which step in George Polya’s problem-solving process involves analyzing the software issue to determine the cause and develop a solution?
Understanding the problem
Ahmed needs to optimize the performance of a web application that is experiencing slow loading times. Which step in George Polya’s problem solving process involves analyzing the factors contributing to the slow loading times and devising strategies to improve performance?
Devising a plan
Mei need sto design an algorithm to sort a large dataset efficiently. Which step in George Polya’s problem-solving process involves understanding the requirements of the sorting algorithm and devising a plan to implement it?
Devising a plan
What is the primary goal of the IEEE and ACM codes of ethics?
To guide ethical decision-making and conduct in the computing profession
Which of the following principles is emphasized in the ACM code of ethics?
Integrity
What is one of the key values promoted by the IEEE and ACM codes of ethics?
Acting in the public interest
What is one of the fundamental principles outlined in the ACM code of ethics?
Avoiding harm to others
Which of the following is a key aspect of the IEEE code of ethics?
Improving technical competence
What does the IEEE code of ethics encourage regarding conflicts of interest?
Prioritizing professional obligations over personal interests
To meet a light deadline,Talia,a software engineer, knowingly writes code that contains a security flaw, risking user data privacy. Which ethical principle does this violate?
Integrity
Daniel, a software engineer, releases a new product without adequate testing, leading to widespread failures. Which ethical principle is violated?
Quality of work
Maya, a data analyst, manipulates data to produce more favorable outcomes for a client. Which ethical principles is she violating?
Transparency
Charlotte, a network engineer, causes a security flaw in her company’s product and then a refuses to take responsibility for it when it is discovered a supervisor. Which ethical principle is compromised?
Accountability
What is intellectual property? (IP)
Property created through intellectual activity
Which concept is a type of intellectual property protection?
Patents
What does IP licensing allow?
The right to use intellectual property under defined conditions
What is an example of IP theft?
Downloading software without a license
Why is cybercrime?
Downloading software without a license
What can be a consequence of cybercrime?
Legal penalties and fines
Maria,a software developer, copies a substantial portion of code from an open source project into his commercial software without proper attribution. Which ethical issue does this scenario represent?
Intellectual property theft
Alexuses his colleagues log-in credentials to access confidential project files without permission because he is various about the progress. Which ethical issue does this scenario represent?
Unauthorized access
Sophia, a social media influencer, creates a fake account to harass a rival influencer by posting negative comments and spreading false information. Which ethical issue does this scenario represent?
Cyber bullying
During a software development project, Michael, finds a way to exploit a vulnerability in a competitors product to gain unauthorized access to their system. Instead of reporting the vulnerability, he uses it to extract sensitive information. Which ethical issue does the scenario represent?
Cybercrime
A programming company has been hired to write code that will send secure messages from one device to another. The Company policy is to follow the software development lifecycle ( SDLC) model for production. Which step will the team expect to go through during the course of this process?
Test the program
A programmer has been asked to lead a project that uses artificial intelligence to search for patters in Wi-Fi signals to improve efficiency and range. The programmer will use the software development lifecycle (SDLC) as a model for design and implementation. Which step is the programmer in when outlining the steps that the program will go through?
Plan the logic
A computer scientist is writing a computer application that will manage financial records for small businesses. The computer scientist is following the software development lifecycles (SDLC) model and just completed the step, “understand the problem.” which step is next in the SDLC?
Plan the logic
What does a technology company need to commit to if adopting the association of computing machinery (ACM) code of ethics?
Perform work only in areas of competence
Which situation represents a violation of the codes of ethics for both the association of computing machinery (ACM) and the institute of electrical and electronic engineers (IEEE)?
One of the division heads assigns work to employees that is outside their area of competence.
What is one situation that illustrates extortion?
A person hack into a university’s servers, locks them down, and will only unlock them for a larger random.
Which statement describes an array?
A collection of elements of the same type stored at contiguous memory locations
Which statement describes a record in programming?
A data structure that holds multiple values of different data types
Which data structure is best suited for storing a collection of different data types?
Record
What is a common characteristic of both arrays and records?
Both can store multiple values
What is the primary advantage of binary search over sequential (linear) search?
It is faster for large data sets
Which search algorithm would course on an unsorted list?
Sequential (linear) search
Which sorting algorithm repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order?
Bubble
Which statement describes linear search?
It checks each element one by one.
Which statement is true about binary search?
It requires the list to be sorted
Which type of sorting algorithm repeatedly finds the minimum element and moves it to the beginning of the list?
Selection
Which flowchart symbolis used toindicate the start or end of a process flow?
Oval
Which flowchart symbol is used to represent a decision or conditional branch?
Diamond
Which flowcharts symbol is used to represent input or output operations?
Parallelogram
How would one express a pseudocode statement to divide a variable total by another variable count?
Total /count
Which pseudocode operation converts an integer variable age to floating-point number?
Float(age)
How would one write a pseudocode statement to add 10 to the variable value?
Value +10
What is the result of dividing 7 by 2 in an integer division?
3
Which pseudocode operation represents a type conversion from a floating-point number toan integer?
Int(num)
Which statement describes a sequence structure in pseudocode?
Executing actions one after another in order
What is the purpose of a selection structure in pseudocode?
To choose different paths based on conditions
Which statement is an example of a dual-alternative if statement?
If (condition) then…else
Which keyword typically used to represent the end of a selection structure in pseudocode?
End if
Which statement best describes a loop structure in pseudocode?
Repeating a set of actions until a condition is met
What is the primary purpose of a loop body in pseudocode?
To contain the statements repeated in a loop
Which keyword is typically used to start a while loop in pseudocode?
While
Which statement describes a nested structure?
Contains another structure within it
What is the main advantage of using a nesting structure in pseudocode?
It allows for more complex decision-making and iterations
Which pseudocode statement is an example of a single-alternative if statement?
If (condition) then
What is the name of the algorithm that sorts a list by repeatedly comparing and swapping adjacent items, with each pass through the list stopping at one end?
Bubble sort
Which describes the programming structure that executes a process a specific number of times?
Count-controlled loop
What is the pseudocude that will convert the integer ato a floating point number?
myFloat x = float(a)
Which piece of pseudocode correctly calculates the integer result of dividing the integer b by the integer f?
B//f
Consider the following code. If (myYear > 1900) print “continue” ELSE print “error” what does the code do?
It prints continue if the value ofmyYear is greater than 1900 and error otherwise.
Set temp to val_1 Set val_1 to val_2 set val_2 to temp. What is accomplished by the pseuducode?
It swaps the values of val_1 and val_2
How does an operating system (OS) manage system performance?
By optimizing the use of CPU, memory, and storage resources
What is the primary purpose of memory management in an operating system?
To efficiently allocate and manage system memory
Which task or tasks are part of process management in an operating system?
Creating, executing, and terminating process
What is the main goal of CPU scheduling in an operating system?
Determining the order in which the CPU executes processes
Which technique does an operating system use to extend physical memory by using disk space?
Virtual memory
Which of the following describes a process in the context of an operating system?
A program in execution
Which CPU scheduling algorithm selects the process with the smallest execution time remaining?
Shortest job next ( SJN)
Which state is a process in when it has completed its execution?
Termination
Which CPU scheduling algorithm assigns a fixed time slice to each processinqueue?
Round-robin ( RR)
Which statement describes paging in memory management?
Allocating fixed-sized blocks of memory
Which statement describes the purpose of a file system in an operating system?
To organize and manage data storage on devices
Which file extensions is typically associated with a text file?
•Txt
In a hierarchical file system, what is the top- level directory called?
Root directory
In a hierarchical file system, what is a subdirectory?
A directory with in another directory
Which statement describes a relative path?
The path to a file or directory relative to the current working directory
What is the primary goal of disk scheduling algorithms?
To minimize seek time and maximize throughput
Which disk scheduling algorithm selects the request closest to the current head position?
Shortest seek time first ( SSTF)
What is the main disadvantage of the first-come,first-served (FCCs) disk scheduling algorithm?
High seek time
Which disk scheduling algorithm minimizes the total seek time by scanning in both directions across the disk?
Elevator (SCAN)
What is an operating system responsible for?
It manages computer resources, such as memory and external devices
What is the name of the state of a process when it is standing by for another process to send a signal that it may continue?
Waiting
What method is a nonpreemptive approach to CPU scheduling?
First come, fist serve (FCFS)
What is one operation common to most file systems?
Create
What is the name of a disk scheduling technique?
First come first serve (FCFS)
What is the primary function of the CPU in a computer?
Perform calculations and execute instructions
Which component is considered volatile memory?
RAM
Which storage device typically offers the fastest data access speed?
Solid state drive (SSD)
Which component is directlyresponsible for executing the instructions of a computer program?
CPU
Which memory component is an example of nonvolatile memory?
ROM
Which type of memory is used to temporarily store data the CPU needs while performing tasks?
RAM
Which term refers to he number of bits a computer can process at one time?
Bus width
What is the primary function of the ALU in a CPU?
Performing arithmetic and logical operations
What is the main function of the control unit within the CPU?
Manage and coordinate the activities of the computer
Which type of storage device typically offers the largest capacity?
HDD
What is the primary function of router in a network?
Direct data traffic between different network
Which protocol is primarily used for transmitting web pages over the internet?
HTTP
What is an IP address?
A unique identifier assigned Te each device on a network
What is an open system?
A system that uses standardized protocols for interoperability
What does the domain name system (DNS) do?
Translates domain names to IP addresses
Which protocol ensures reliable transmission of data over the internet?
TCP
Which type of network topology connects all devices to a central hub?
Star topology
What does the term “bandwidth” refer to in networking?
The maximum rate of data transfer across a network path
Which lager of the OSI modelis responsible for establishing managing, and terminating connects between applications?
The session layer
What is the purpose of a firewall in a network?
To prevent unauthorized access to or from a private network
What is a key characteristic of a supercomputer?
High-speed processing for complex tasks
Which device is an example ofan embedded computer?
Washing machine control panel
What is a recent hardware trend in personal computing?
Increasing use of multicorce processors
Which statement describes the internet of things (IoT)?
A system of interconnected devices that can communicate and exchange data
Which type of computer do large organizations typically use for critical applications and bulk data processing?
Mainframe
Which device is an example of an IoT?
A) desktop computer (PC)
B) smart thermostat
C) external hard drive
D) printer
B) smart thermostat
What distinguishes a server from a personal computer (PC)?
Servers manage network resources and provide services to multiple users
What is the primary benefit of using multicore processors in modern computers?
Enhanced processing performance for multitasking and parallel processing
What describes a server farm?
A collection of interconnected severs working together
What is a common use for graphic processing units (GPUs) in modern computing?
Enhancing video and image processing
What is one component is considered a major part of the Von Neumann architecture?
Arithmetic /logic unit
What is true about reading only memory (ROM)?
It is used to store instructions that the computer needs to start up
How is a ring topology set up in a local area network (LAN)?
All nodes are connected to exactly two other nodes in a circular data path?
The location of a computer is given either falcon.csc.computersoft.org or 205.39.155.18. What part of this information is known as the hostname?
Falcon.Csc.computersoft.org
What is the name for a computer placed directly inside another electronic device designed for a specific purpose?
Embedded computer