All In One Flashcards

1
Q

A programmer has been asked to lead a project that uses AI to search for patterns in WiFi signals to improve efficiency and range. The programmer will use the software development lifecycle ( SDLC) as a model for design and implementation. Which step is the programmer in when choosing a programming language and typing the code?

A

Code the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to the state of a process when it’s being created?

A

New

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the CPU scheduling method in which a process is not interrupted and is allowed to finish before another process starts?

A

First come, first serve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement describes a characteristic of sequential file access?

A

The file is seen as linear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is an example of integer data type?
A) 3.14
B) “hello”
C) true
D) 42

A

42

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data type is used to represent textual data?

A

String

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which variable name is valid in most programming languages?

A

Variable_123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement correctly assigns the value 10 to the variable X?
A) x==10
B) 10 =x
C) x=>10
D) x=10

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used for iteration in programming?

A

While loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the result of the expression 2+3x4?

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which operator has the highest precedence?

A

X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which value is a floating-point number?
A) “3.14”
B) 3.14
C) 42
D) true

A

3.14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the result of the expression (2+3)x4?

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a linked list?

A

A collection of elements, each containing a reference to the next element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What best describes a stack?

A

Last-in, first-out (LIFO) structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary characteristic of a queue?

A

There is a first-in, first-out (FIFO) access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a subprogram?

A

A sequence of program instructions that Perform a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In psuedocode, how would you call a function named CalculateSum with two parameters a and b?

A

CalculateSum ( a,b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary purpose of using subprograms in a program?

A

To allow for code reuse and better organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which operation is used to add an element to the top of a stack?

A

Push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which scenario is a stack most suitable for?

A

Storing undo operations in a text editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the main purpose of object- oriented programming ( OOP)?

A

To organize code into reusable components called objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement describes a class in OOP?

A

A blueprint for creating objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encapsulation in OOP?

A

The practice of keeping data and methods that manipulate the data in a single unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which feature of OOP allows programmers to create new classes based on existing classes?

A

Inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a polymorphism in OOP?

A

The ability of different objects to respond to the same method in different ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which keywords is used in many programming languages to create a new instance of a class?

A

New

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What dues the term “inheritance hierarchy” referring to in OOP?

A

The organization of classes into a tree structure based on inheritance relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does the term “object” refer to in OOP?

A

An instance of a class containing attributes and methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which principle of OOP is demonstrated by restricting access to certain parts of an object?

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What dues the ter “abstraction” refer to in OOP?

A

The practice of hiding the complex implementation details and showing only the necessary features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which valve is stored as an integer in computer programming?
A) 21
B) -306.5
C) “O”
D) true

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which coding construct repeats a task while a condition is true?

A

Iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How are items accessed in a stack?

A

The last item to be added becomes first item removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A web browser puts websites into a viewing history log and accesses the most recent when the back button is clicked. Which data structure would be appropriate for this situation?

A

Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the relationship between a parameter and an argument?

A

A parameter is a temporary variable in a function that receives the actual value of an argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which programming language is considered to be a declarative language?

A

Lisp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does computational thinking involve?

A

Solving problems using a logical steps?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the software development lifecycle ( SDLC) primarily concerned with?

A

Managing the software development process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What do problem-solving methodologies in computational thinking emphasize?

A

Approaching problems systematically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the four steps of George poly as problem-solving method?

A

Identify, research, develop, evaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which step involves coming up with possible strategies to solve the problem?

A

Devising a plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the purpose of maintenance phase in the computer problem-solving process?

A

To ensure the continued functionality of the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which step in George Polya’s problem solving process involves understanding the context of the problem, identifying what is being a seed, and recognizing any constraints?

A

Understanding the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Hannah is troubleshooting issue where a program crashes on startup. She needs to identify the root cause of the problem and find a solution. Which step in George Polya’s problem-solving process involves analyzing the software issue to determine the cause and develop a solution?

A

Understanding the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Ahmed needs to optimize the performance of a web application that is experiencing slow loading times. Which step in George Polya’s problem solving process involves analyzing the factors contributing to the slow loading times and devising strategies to improve performance?

A

Devising a plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Mei need sto design an algorithm to sort a large dataset efficiently. Which step in George Polya’s problem-solving process involves understanding the requirements of the sorting algorithm and devising a plan to implement it?

A

Devising a plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the primary goal of the IEEE and ACM codes of ethics?

A

To guide ethical decision-making and conduct in the computing profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following principles is emphasized in the ACM code of ethics?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is one of the key values promoted by the IEEE and ACM codes of ethics?

A

Acting in the public interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is one of the fundamental principles outlined in the ACM code of ethics?

A

Avoiding harm to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following is a key aspect of the IEEE code of ethics?

A

Improving technical competence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does the IEEE code of ethics encourage regarding conflicts of interest?

A

Prioritizing professional obligations over personal interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

To meet a light deadline,Talia,a software engineer, knowingly writes code that contains a security flaw, risking user data privacy. Which ethical principle does this violate?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Daniel, a software engineer, releases a new product without adequate testing, leading to widespread failures. Which ethical principle is violated?

A

Quality of work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Maya, a data analyst, manipulates data to produce more favorable outcomes for a client. Which ethical principles is she violating?

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Charlotte, a network engineer, causes a security flaw in her company’s product and then a refuses to take responsibility for it when it is discovered a supervisor. Which ethical principle is compromised?

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is intellectual property? (IP)

A

Property created through intellectual activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which concept is a type of intellectual property protection?

A

Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What does IP licensing allow?

A

The right to use intellectual property under defined conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is an example of IP theft?

A

Downloading software without a license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Why is cybercrime?

A

Downloading software without a license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What can be a consequence of cybercrime?

A

Legal penalties and fines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Maria,a software developer, copies a substantial portion of code from an open source project into his commercial software without proper attribution. Which ethical issue does this scenario represent?

A

Intellectual property theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Alexuses his colleagues log-in credentials to access confidential project files without permission because he is various about the progress. Which ethical issue does this scenario represent?

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Sophia, a social media influencer, creates a fake account to harass a rival influencer by posting negative comments and spreading false information. Which ethical issue does this scenario represent?

A

Cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

During a software development project, Michael, finds a way to exploit a vulnerability in a competitors product to gain unauthorized access to their system. Instead of reporting the vulnerability, he uses it to extract sensitive information. Which ethical issue does the scenario represent?

A

Cybercrime

68
Q

A programming company has been hired to write code that will send secure messages from one device to another. The Company policy is to follow the software development lifecycle ( SDLC) model for production. Which step will the team expect to go through during the course of this process?

A

Test the program

69
Q

A programmer has been asked to lead a project that uses artificial intelligence to search for patters in Wi-Fi signals to improve efficiency and range. The programmer will use the software development lifecycle (SDLC) as a model for design and implementation. Which step is the programmer in when outlining the steps that the program will go through?

A

Plan the logic

70
Q

A computer scientist is writing a computer application that will manage financial records for small businesses. The computer scientist is following the software development lifecycles (SDLC) model and just completed the step, “understand the problem.” which step is next in the SDLC?

A

Plan the logic

71
Q

What does a technology company need to commit to if adopting the association of computing machinery (ACM) code of ethics?

A

Perform work only in areas of competence

72
Q

Which situation represents a violation of the codes of ethics for both the association of computing machinery (ACM) and the institute of electrical and electronic engineers (IEEE)?

A

One of the division heads assigns work to employees that is outside their area of competence.

73
Q

What is one situation that illustrates extortion?

A

A person hack into a university’s servers, locks them down, and will only unlock them for a larger random.

74
Q

Which statement describes an array?

A

A collection of elements of the same type stored at contiguous memory locations

75
Q

Which statement describes a record in programming?

A

A data structure that holds multiple values of different data types

76
Q

Which data structure is best suited for storing a collection of different data types?

77
Q

What is a common characteristic of both arrays and records?

A

Both can store multiple values

78
Q

What is the primary advantage of binary search over sequential (linear) search?

A

It is faster for large data sets

79
Q

Which search algorithm would course on an unsorted list?

A

Sequential (linear) search

80
Q

Which sorting algorithm repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order?

81
Q

Which statement describes linear search?

A

It checks each element one by one.

82
Q

Which statement is true about binary search?

A

It requires the list to be sorted

83
Q

Which type of sorting algorithm repeatedly finds the minimum element and moves it to the beginning of the list?

84
Q

Which flowchart symbolis used toindicate the start or end of a process flow?

85
Q

Which flowchart symbol is used to represent a decision or conditional branch?

86
Q

Which flowcharts symbol is used to represent input or output operations?

A

Parallelogram

87
Q

How would one express a pseudocode statement to divide a variable total by another variable count?

A

Total /count

88
Q

Which pseudocode operation converts an integer variable age to floating-point number?

A

Float(age)

89
Q

How would one write a pseudocode statement to add 10 to the variable value?

90
Q

What is the result of dividing 7 by 2 in an integer division?

91
Q

Which pseudocode operation represents a type conversion from a floating-point number toan integer?

92
Q

Which statement describes a sequence structure in pseudocode?

A

Executing actions one after another in order

93
Q

What is the purpose of a selection structure in pseudocode?

A

To choose different paths based on conditions

94
Q

Which statement is an example of a dual-alternative if statement?

A

If (condition) then…else

95
Q

Which keyword typically used to represent the end of a selection structure in pseudocode?

96
Q

Which statement best describes a loop structure in pseudocode?

A

Repeating a set of actions until a condition is met

97
Q

What is the primary purpose of a loop body in pseudocode?

A

To contain the statements repeated in a loop

98
Q

Which keyword is typically used to start a while loop in pseudocode?

99
Q

Which statement describes a nested structure?

A

Contains another structure within it

100
Q

What is the main advantage of using a nesting structure in pseudocode?

A

It allows for more complex decision-making and iterations

101
Q

Which pseudocode statement is an example of a single-alternative if statement?

A

If (condition) then

102
Q

What is the name of the algorithm that sorts a list by repeatedly comparing and swapping adjacent items, with each pass through the list stopping at one end?

A

Bubble sort

103
Q

Which describes the programming structure that executes a process a specific number of times?

A

Count-controlled loop

104
Q

What is the pseudocude that will convert the integer ato a floating point number?

A

myFloat x = float(a)

105
Q

Which piece of pseudocode correctly calculates the integer result of dividing the integer b by the integer f?

106
Q

Consider the following code. If (myYear > 1900) print “continue” ELSE print “error” what does the code do?

A

It prints continue if the value ofmyYear is greater than 1900 and error otherwise.

107
Q

Set temp to val_1 Set val_1 to val_2 set val_2 to temp. What is accomplished by the pseuducode?

A

It swaps the values of val_1 and val_2

108
Q

How does an operating system (OS) manage system performance?

A

By optimizing the use of CPU, memory, and storage resources

109
Q

What is the primary purpose of memory management in an operating system?

A

To efficiently allocate and manage system memory

110
Q

Which task or tasks are part of process management in an operating system?

A

Creating, executing, and terminating process

111
Q

What is the main goal of CPU scheduling in an operating system?

A

Determining the order in which the CPU executes processes

112
Q

Which technique does an operating system use to extend physical memory by using disk space?

A

Virtual memory

113
Q

Which of the following describes a process in the context of an operating system?

A

A program in execution

114
Q

Which CPU scheduling algorithm selects the process with the smallest execution time remaining?

A

Shortest job next ( SJN)

115
Q

Which state is a process in when it has completed its execution?

A

Termination

116
Q

Which CPU scheduling algorithm assigns a fixed time slice to each processinqueue?

A

Round-robin ( RR)

117
Q

Which statement describes paging in memory management?

A

Allocating fixed-sized blocks of memory

118
Q

Which statement describes the purpose of a file system in an operating system?

A

To organize and manage data storage on devices

119
Q

Which file extensions is typically associated with a text file?

120
Q

In a hierarchical file system, what is the top- level directory called?

A

Root directory

121
Q

In a hierarchical file system, what is a subdirectory?

A

A directory with in another directory

122
Q

Which statement describes a relative path?

A

The path to a file or directory relative to the current working directory

123
Q

What is the primary goal of disk scheduling algorithms?

A

To minimize seek time and maximize throughput

124
Q

Which disk scheduling algorithm selects the request closest to the current head position?

A

Shortest seek time first ( SSTF)

125
Q

What is the main disadvantage of the first-come,first-served (FCCs) disk scheduling algorithm?

A

High seek time

126
Q

Which disk scheduling algorithm minimizes the total seek time by scanning in both directions across the disk?

A

Elevator (SCAN)

127
Q

What is an operating system responsible for?

A

It manages computer resources, such as memory and external devices

128
Q

What is the name of the state of a process when it is standing by for another process to send a signal that it may continue?

129
Q

What method is a nonpreemptive approach to CPU scheduling?

A

First come, fist serve (FCFS)

130
Q

What is one operation common to most file systems?

131
Q

What is the name of a disk scheduling technique?

A

First come first serve (FCFS)

132
Q

What is the primary function of the CPU in a computer?

A

Perform calculations and execute instructions

133
Q

Which component is considered volatile memory?

134
Q

Which storage device typically offers the fastest data access speed?

A

Solid state drive (SSD)

135
Q

Which component is directlyresponsible for executing the instructions of a computer program?

136
Q

Which memory component is an example of nonvolatile memory?

137
Q

Which type of memory is used to temporarily store data the CPU needs while performing tasks?

138
Q

Which term refers to he number of bits a computer can process at one time?

139
Q

What is the primary function of the ALU in a CPU?

A

Performing arithmetic and logical operations

140
Q

What is the main function of the control unit within the CPU?

A

Manage and coordinate the activities of the computer

141
Q

Which type of storage device typically offers the largest capacity?

142
Q

What is the primary function of router in a network?

A

Direct data traffic between different network

143
Q

Which protocol is primarily used for transmitting web pages over the internet?

144
Q

What is an IP address?

A

A unique identifier assigned Te each device on a network

145
Q

What is an open system?

A

A system that uses standardized protocols for interoperability

146
Q

What does the domain name system (DNS) do?

A

Translates domain names to IP addresses

147
Q

Which protocol ensures reliable transmission of data over the internet?

148
Q

Which type of network topology connects all devices to a central hub?

A

Star topology

149
Q

What does the term “bandwidth” refer to in networking?

A

The maximum rate of data transfer across a network path

150
Q

Which lager of the OSI modelis responsible for establishing managing, and terminating connects between applications?

A

The session layer

151
Q

What is the purpose of a firewall in a network?

A

To prevent unauthorized access to or from a private network

152
Q

What is a key characteristic of a supercomputer?

A

High-speed processing for complex tasks

153
Q

Which device is an example ofan embedded computer?

A

Washing machine control panel

154
Q

What is a recent hardware trend in personal computing?

A

Increasing use of multicorce processors

155
Q

Which statement describes the internet of things (IoT)?

A

A system of interconnected devices that can communicate and exchange data

156
Q

Which type of computer do large organizations typically use for critical applications and bulk data processing?

157
Q

Which device is an example of an IoT?
A) desktop computer (PC)
B) smart thermostat
C) external hard drive
D) printer

A

B) smart thermostat

158
Q

What distinguishes a server from a personal computer (PC)?

A

Servers manage network resources and provide services to multiple users

159
Q

What is the primary benefit of using multicore processors in modern computers?

A

Enhanced processing performance for multitasking and parallel processing

160
Q

What describes a server farm?

A

A collection of interconnected severs working together

161
Q

What is a common use for graphic processing units (GPUs) in modern computing?

A

Enhancing video and image processing

162
Q

What is one component is considered a major part of the Von Neumann architecture?

A

Arithmetic /logic unit

163
Q

What is true about reading only memory (ROM)?

A

It is used to store instructions that the computer needs to start up

164
Q

How is a ring topology set up in a local area network (LAN)?

A

All nodes are connected to exactly two other nodes in a circular data path?

165
Q

The location of a computer is given either falcon.csc.computersoft.org or 205.39.155.18. What part of this information is known as the hostname?

A

Falcon.Csc.computersoft.org

166
Q

What is the name for a computer placed directly inside another electronic device designed for a specific purpose?

A

Embedded computer