Download presentation
Presentation is loading. Please wait.
Published byMagdalene Baldwin Modified over 8 years ago
1
Review for final exam CS 101 Summer 2012
2
If the street is clear take two steps else wait a minute This is an example of which structure? 1.A loop / repetition 2.A branch / selection 3.A sequence 4.A variable
3
CPUs understand 1.English 2.High level languages 3.Machine language 4.Pseudocode
4
A(n) ____ translates high-level language to machine language. 1.Editor 2.Debugger 3.Syntax checker 4.Compiler
5
In Alice, ___ would be a method. 1.A penguin 2.Penguin.talk 3.Penguin.isbelow 4.A mouse click 5.None of the above
6
The difference between ASCII and Unicode is that Unicode __________. a. uses 0 bits b. uses twice as many bytes c. uses half as many bytes d. uses 8 bits
7
A syntax error 1.Can be caused by a missing punctuation mark 2.Can be caused by a division by zero 3.Is impossible in high-level languages 4.Is nearly impossible in Alice 5.1 and 4
8
OLE is about 1.Using a spreadsheet wisely 2.Connecting documents created by different applications 3.Linking web pages together 4.Translating documents to Spanish
9
The binary number 110110 is equivalent to 1.25 2.30 3.54 4.110,110
10
_____ extends the range of wireless networks. a. WAN b. WAP c. NIC d. none of the above
11
An embedded object 1.Is automatically updated when the source document is changed 2.Is stored in the target document, along with a limited application to edit it 3.Is stored in the native format of the target document 4.None of the above
12
About Moore’s law 1. It is about the power of a computer chip 2.It says chip power will double in 18 months-2 years 3.It is not a law of nature 4.All of the answers
13
Which method of pasting gives the most independence between target and source? 1.Copy and paste 2.Linking 3.Embedding 4.They are all the same
14
An algorithm is 1.a low-level language translator 2.a set of instructions to solve a problem 3.a compiler 4.something only programmers use
15
A _________ prevents access to the network by unauthorized users by screening and validating data packets. a. blackbox b. firewall c. hardwall d. none of the above
16
The system clock 1.keeps the date and time for the system 2.puts out a signal that keeps the pieces of the system in sync 3.is measured in GHz or MHz 4.2 and 3
17
Non-volatile storage 1.retains contents without power 2.can be magnetic 3.can be optical 4.can be solid-state 5.all of the answers
18
A heat sink 1.is obsolete, they are replaced by batteries 2.gives a route for heat to leave the CPU 3.is usually made of aluminum or ceramic 4.is the only way systems have to cool off
19
A computer virus 1.Needs to be noticed by the user 2.Wants to be invisible 3.Has the main goal of destroying data 4.Can run itself
20
A "Denial of Service" attack 1.Can happen to a computer that is not connected to a network. 2.Overwhelms a machine with too many requests for communication from a network. 3.Only happens to Windows machines. 4.Only happens to MS-DOS machines.
21
The difference between a virus and a Trojan horse is 1.The Trojan is harmless. 2.The Trojan wants to be noticed and downloaded. 3.A virus is larger. 4.The Trojan does not depend on user action to activate.
22
The cable that carries the highest bandwidth is 1.twisted pair 2.Coaxial 3.Fiber optic 4.It is impossible to tell
23
Telecommuting does not 1.Reduce pollution 2.Let employers choose from a larger talent pool 3.Let employees choose from more opportunities 4.Encourage social interaction with fellow workers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.