CompSci Final Exam Flashcards
Machine language is a high-level programming language.
False
One of the benefits of machine language is that it uses natural language and mathematical notations.
T/F
False
Clients cannot perform local computations without access to the network.
Fasle
Assemblers,____ and interpreters are all exampels of language services.
Compilers
for a program to run on a naked machine, it must be represented in binary.
True
A Von Neumann computer without any helpful user-oriented features is called a(n)._____ machine.
naked
The_____ hides from the user the messy details of the underlying hardware.
Interface
In__________, a single instruction provides multiple instructions in __________
high-level programming, machine language
A(n)______ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
conditional
Which language does NOT require a semicolon to terminate an executable program statement
Python
The software translator used to convert our high-level language instructions into machine language instructions is called a(n)________
Complier
High-level programming languages were created to overcome the deficiencies of________ language.
assembly
Assembly language programs are _____ Specific
Machine
Newer languages such as Java and C# were developed specifically to run on a variety of hardware platforms without the ned for separate ________ for each type of machine.
Complier
The __________ computer architecture is characterized by sequential fetch- decode-execute cycles.
Von Neumann
Each language we learned about uses its own notation (-, l, or #) ot denote aprogram comment.
true
A LAN connects devices that are not ni close proximity but rather are across town, across the country, or across the ocean.
False
_________is a low-power wireless standard used to communicate between devices located quite close to each other.
Bluetooth
A ________ makes internetwork connections and provides routing between different WANs.
Gateway
is the term for the separation of a service from the entity (or entities) providing that service.
Virtualization
The most common public-key encryption algorithm is ____
RSA
A_______ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.
Caesar
The ________ takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.
hash function
An asymmetric encryption algorithm requires the use of a secret key known to both the sender and receiver.
T/F
False
The success of RSA encryption depends on the fact that ti is extremely difficult to find the prime factors for n if n is large number.
T/F
True
A block cipher encodes one character at a time.
False
Computers are better than humans where there seems to be a high level of complexity, approximation, or ambiguity.
T/F
False
In some areas of the brain, an individual neuron may collect signals from as many as 100,000 other neurons and send s
signals to equally large number of other neurons.
T/F
True
In a neural network, both the knowledge representation and also the “programming” are stored in the network itself as the weights of the connections and the thresholds of the neurons.
T/F
True
Building a machine that can beat a human at chess was viewed as the last of the “easy” hard problems.
T/F
True
To be considered a robot, a machine must be in some way humanoid in design. True/false
False
The Turing test is used to determine if a machine exhibits behavior indistinguishable from________________
Human
is the study of how we as humans think and learn.
Cognitive science
_______ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
Artificial intelligence
A _____ is presented with training data, for which the correct outputs are known.
neural network
The ________ causes the network to settle into a stable state where it can correctly respond, to any desired degree of accuracy, to al inputs in the training set.
back propagation algorithm
A(n) i s a form of software technology that is designed ot interact collaboratively with a user somewhat in the mode of a personal assistant.
intelligent agent
A(n) ________ ,also called an expert system, attempts to mimic the human ability ot engage pertinent facts and string them together in a logical fashion to reach some conclusion.
rule-based system