Progress Test 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1. From the choices below, select the ones that are types of algorithm flows.

a. reverse operations
b. sequential operations
c. conditional operations
d. iterative operations
2. Look at the following items below and identify which type of operation each
one is and properly label them. Use the terms conditional, sequential, or
iterative.Look at the following items below and identify which type of
operation each one is and properly label them. Use the terms conditional,
sequential, or iterative.
A. Prompt user for input for the value of Total.
B. Calculate the value of Total. If the value of Total is greater than 0, output
the value is valid.
C. Calculate the average of the three test scores.
D. Carry out steps 7, 8, and 10 ninety-four times.
A:Sequential
B:Conditional
C:Sequential
D:Iterative
3. In order to designate a statement group, this is what should be done in
order to create a "block of code".
Which of these describes how instructions are handled in the Von
Neumann architecture?
a. none of these
b. encoded as binary values and stored internally
c. encoded as external wired connections
d. encoded as decimal values and stored internally
e. encoded as digital values on external paper tape
4. Which of these software package activities is the responsibility of
computer scientists?
a. building
b. designing
c. testing
d. all of these
e. specifying
5. From the choices below, choose the one that is not true in regard to an
algorithmic solutions to a problem.
a. Some problems have no algorithmic solution.
b. Some problems may have a solution, but none has been discovered yet.
c. All of these are true statements.
d. Every problem has an algorithmic solution.
e. Some problems have an algorithmic solution that would take too long to execute.
6. Which of these is output by the following algorithm?
set the value of x to 0
add 1 to x
if the value of x < 1
subtract 1 from the value of x
else
add 1 to the value of x
print the value of x
Which of these major advances did NOT occur during the fifth generation of
computer development?
a. cloud computing
b. mobile computing
c. ultra-large-scale integrated circuits
d. time-sliced operating systems
e. worldwide network
7. From the list below, choose the statement that describes what a virtual
machine is.
a. an electrical engineering view of a computer system
b. the user-oriented view of a computer system
c. cloud computing
d. artificial intelligence
e. binary instructions stored in memory
8. Which of these is a characteristic of abstraction?
a. the basis for top-down design
b. allows us to manage large, complex systems
c. allows us to understand large, complex systems
d. separates high-level view from low-level detail
e. all of these
9. When searching an unordered list of values, this is an algorithm that could
be used to look through the values within the list.
a. random search
b. swap search
c. sequential search
d. binary search
e. reverse search
10. How many instances could a while loop be completed?
a. zero
b. all of these
c. infinitely many
d. two
e. one
11. Select the type of loop that is certain to execute the actions outlined in its
body at least one time?
a. if/then/else
b. do/while
c. if
d. while
e. all of these
12. The language we speak and write in our everyday lives is considered this.
a. free-flowing
b. specific
c. a mathematical calculation
d. unstructured
e. natural language
13. Which of these is NOT a basic pseudocode sequential operation?
a. computation
b. conditional
c. input
d. All of these are basic pseudocode sequential operations.
e. output
14. Which of these best describes an index?
a. a variable used as a pointer into a list of items
b. an alphabetical list of pointers to items
c. a line number in an algorithm
d. a list of items
e. an alias for a variable
15. Which of these is used in a pseudocode computation statement?
a. print
b. get
c. and
d. set
e. all of these
16. What is the order of magnitude for an algorithm with a work function f(n) =
2^n + 7n^3 + 100log(n), where the log base is 2?
a. O(100log(n))
b. O(2)
c. O(7n^3)
d. O(2^n)
e. O(log(n))
17. If you have a choice, which of these orders of magnitude should you
choose?
a. O(2^n)
b. O(n log(n))
c. O(log(n))
d. O(n)
e. O(n^2)
18. Which type of algorithm used against multiple systems is the best way in
which to compare two similar algorithms that perform the same task or
benchmarking?
a. Shuffle
b. Shift-Left
c. Time
d. Shift-Right
19. Which of these is true of the relationship of time (runtime) and space
(memory) usage for algorithm design?
a. decreasing time may require an increase in space
b. all of these
c. decreasing space may require an increase in time
d. both time and space may increase
e. you may be able to decrease both time and space
20. When looking at the efficiency of a sequential search, the smaller the list of
items, then _ (blank) _ work must be done to search it.
a. about the same compared to other lists
b. no
c. more
d. less
21. Which values of the input size (n) are most relevant in algorithm analysis?
a. odd values
b. even values
c. medium sized values
d. large values
e. small values
22. Which of these is an attribute of a preferred algorithm?
a. all of these
b. ease of understanding
c. efficiency
d. elegance
e. correctness
23. Which of these orders of magnitudes characterizes a 3-deep, nested loops
situation, where all 3 of the loops iterate the input size (n) number of times?
a. logarithmic time
b. linear time
c. cubic time
d. quadratic time
e. exponential time
24. Choose from the following a confounding factor when considering
algorithm experimental assessment in computer science.
a. all of these
b. Differences in software platforms
c. Differences in input content / organization
d. Differences in hardware platforms
e. Requires the algorithm to already be implemented
25. In this search algorithm, the best case occurs when the value being
searched for is the first value in the list.
a. Exponential
b. Sequential
c. Converging-Pointers
d. The Copy-Over
26. Which of these greatly influences the design of an algorithm to solve a
problem?
a. the requirements specified for the algorithm
b. the organization of the input data
c. the experience of the designer
d. the number of items in the input data
e. all of these
27. Which of these special-purpose programming languages is targeted for use
with databases?
a. PHP
b. HTML
c. SQL
d. JavaScript
e. XML
28. We should design/select algorithms that perform well for which of these
input data cases?
a. infinite data case
b. no data case
c. worst case
d. average case
e. best case
29. This type of algorithm attribute is the equivalent of miles per gallon or use
of space in cars.
a. Complexity
b. Elegance
c. Aesthetics
d. Efficiency
30. Which of these is a part of the MIMD (multiple instruction stream/multiple
data stream) model of paralell processing architecture.
a. divide-and-conquer model
b. communication channel
c. all of these
d. multiple memory units
e. multiple processors
31. Which of these special-purpose programming languages is targeted for the
creation of code fragments that can be embedded in webpages to make
those pages active rather than static?
a. PHP
b. SQL
c. JavaScript
d. HTML
e. XML
32. Which of these influences an algorithm's inherent units of work function?
a. the computing machine's processor speed
b. the hard disk access speed
c. the computing machines memory
d. all of these
e. the input size (n)
33. Which of these are key elements of object-oriented programming?
a. polymorphism
b. classes
c. all of these
d. inheritance
e. encapsulation
34. Which of these special-purpose programming languages is a server-side
scripting language targeted to the creation of dynamic webpages?
a. SQL
b. HTML
c. JavaScript
d. PHP
e. XML
35. Choose which order of magnitude fits an algorithm model of continued
doubling of its work.
a. quadratic time
b. exponential time
c. linear time
d. constant time
e. logarithmic time
36. Which of the following was the primary innovation of the Von Neumann
architecture?
a. Ability to perform floating-point (real number) calculations
b. Use of transistors instead of vacuum tubes
c. Purely electronic design, no mechanical parts for computation
d. Storage of program instructions in the internal memory uni
37. In which of these programming languages is there less possibility for a
side effect?
a. Scheme
b. COBOL
c. JavaScript
d. Java
e. C#
38. Which of these advantages is provided by a high-level programming
language?
a. all of these
b. programs are portable across machines
c. use standard mathematical notation
d. the programmer can take a macroscopic view of tasks
39. Which of these procedural programming languages was targeted for
development of applications that serve common business needs such as
input data and output report formatting?
a. Fortran
b. Ada
c. COBOL
d. C/C++
e. Python
40. The binary search algorithm has which of these orders of magnitude?
a. O(n^2)
b. O(log(n))
c. O(n log(n))
d. O(n)
e. O(2^n)
41. Which of these languages does NOT require strong typing of variable
names, but rather allows dynamic typing based on the variable's current
value?
a. Python
b. Java
c. Ada
d. C#
e. C++
42. Which of these are included in the study of algorithms?
a. their linguistic realizations
b. All of these are included in the study of algorithms.
c. their formal and mathematical properties
d. their hardware realizations
e. their applications
43. Which of these is NOT a fundamental part of the logic programming
paradigm?
a. knowledge base
b. rules
c. multicore computing
d. query
e. inference engine
44. Which of these is characteristic of a pseudocode iterative flow?
a. changes the value of a variable
b. a group of statements is performed multiple times
c. performs a mathematical calculation
d. all statements are performed once from top to bottom
e. asks a yes/no question
45. Which of these should be true of an algorithm?
a. no ambiguities
b. can be effectively computed
c. well-ordered
d. produces results and stops in a reasonable amount of time
e. All of these should be true of an algorithm
46. An algorithm is considered acceptable at this point.
a. when it produces the correct result for all possible cases
b. when it follows established grammar guidelines
c. when it produces a reasonable estimate for all possible cases
d. it is impossible to determine if it is correct
e. when it produces the correct result for one case
47. These are beneficial to perform when rating one system against another
with respect to variations in input.
a. Intensive tests
b. Benchmarks
c. Comparison times
d. Time trials
48. Internet service with speeds greater than 256K Mbps is called _ (blank) _.
a. DSL (Digital Subscriber Line)
b. LAN (Local Area Network)
c. Broadband (DSL and Cable Modem)
d. WLAN (Wireless Wide Area Network)
49. Which of the following is a type of cloud computing category?
a. servers
b. open-source
c. infrastructure
d. slackware
50. Which of these is a potential benefit of cloud computing?
a. application services
b. platform and development services
c. all of these
d. infrastructure services
e. virtualization
51. Which of these devices can transmit messages between different types of
networks?
a. repeater
b. router
c. switch
d. bridge
e. transceiver
52. The transport layer of the TCP/IP protocol uses which of these to identify a
program?
a. IP address
b. program name
c. routing table
d. URL
e. port number
53. Which of these is NOT a problem with client/server computing?
a. large up-front capital expenditures
b. need for physical space
c. need for in-house technical staff
d. shared computer resources and services
e. significant ongoing operating costs
54. Which of these is an operating system responsibility?
a. execute programs
b. all of these
c. control access to and operations on files
d. receive user commands
e. control access to the computer
55. Which of these is NOT a type of wireless network?
a. metropolitan area network (MAN)
b. Wi-Fi
c. personal area network (PAN)
d. wireless local area network (WLAN)
e. digital subscriber line (DSL)
56. Which of these are problems with wireless data communications?
a. environmental problems
b. higher error rates
c. all of these
d. security
e. line of sight required between transmitters
57. Which of these governs what a verified user is allowed to do?
a. decryption
b. authorization
c. authentication
d. encryption
e. phishing
58. In this type of function, a password is mixed-up and rearranged according
to a specific formula.
a. stash function
b. encryption function
c. hash function
d. mash function
59. This is a method that is non-technical in regards to getting a password
information from a person.
a. Social networking
b. Social engineering
c. Social management
d. Social objecting
60. Which of these is the result of encryption?
a. ciphertext
b. symmetric text
c. biometric text
d. plaintext
e. public key
61. Which of these is a type of malware that spreads via self-replication,
without needing to be carried by an infected host file?
a. worm
b. phishing
c. virus
d. Trojan horse
e. denial of service
62. Which of these is not a file access control list privilege level?
a. delete
b. execute
c. All of these are file access control list privilege levels.
d. read
e. write
63. Which of these uses deception to lure people into providing personal
information?
a. authentication
b. encryption
c. phishing
d. decryption
e. authorization
64. A single letter of ciphertext is generated using just one letter of plaintext in
this type of a cipher.
a. modulo
b. shift
c. substitution
d. next
65. This term is the process of keeping information secure and protecting it
from those individuals that should not have access to the information.
a. Information security
b. Network security
c. Network assurance
d. Information assurance
66. When an integer is more than 1 and can only be written as the product of
itself and 1 it is referred to as this.
a. whole number
b. prime number
c. natural number
d. primary number
67. Within the United States, the Census Bureau of the U.S. Department of
Commerce estimated ecommerce retail sales _ (blank) _ in the first quarter
of 2017 from the first quarter of 2016.
a. increased by 18%
b. increased by 14%
c. increased by 4%
d. increased by 8%
68. _ (blank) _ is a kind of software that helps to connect existing programs
with a web site.
a. Web site
b. all of the answers are correct
c. Database application
d. Microsoft Windows
69. A _ (blank) _ is an attribute or combination of attributes that uniquely
identifies a tuple.
a. secondary key
b. primary key
c. identification key
d. foreign key
e. preferred key
70. These will layout and manage a website for a fee on a continual basis.
a. application hosting provider
b. application management provider
c. application manager
d. application service provider
71. A business model that evaluates customers walking into a store at varying
times would use this type of model as opposed to one that uses exact
equations.
a. numerical approximations
b. algebraic approximations
c. statistical approximations
d. probabilistic approximations
72. Records that are related to one another are kept in this.
a. data file
b. data chain
c. record file
d. file sheet
73. This type of model involves writing specific equations that outline the
behavior of a system that is a continuous time function.
a. composite model
b. decomposed model
c. continuous model
d. unit model
74. Looking at drawing a card of throwing the dice programmatically could be
viewed as this.
a. deterministic component
b. stochastic component
c. static component
d. conventional component
75. These are attributes that identify a tuple and are unique.
a. foreign key
b. preferred key
c. primary key
d. secondary key
76. The categories of information within a database are typically referred to as
a(n) what?
a. tuple
b. attribute
c. element
d. entity

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy