1. ____________ identifies the ways that words are used in a language.
A. Programming
B. Framework
C. Syntax
D. Semantics
2. Object oriented programming is an example of:
A. a first generation language.
B. a sophisticated language group.
C. a machine-like language.
D. an assembly language.
3. Since no translation is needed, instructions written in machine language:
A. are easy to read.
B. are written in English.
C. use Unicode.
D. execute quickly.
4. The use of assembly language is limited because:
A. the source code is specific to the hardware.
B. it can only be used when processor power is high.
C. it is not possible to use it for complex commands.
D. it cannot convert source code into machine code.
5. The early 3GL used for accounting and payroll is:
A. COBOL.
B. FORTRAN.
C. ADA.
D. C#.
6. ____________ uses blocks of code to handle standard procedures.
A. Structured programming
B. Modular programming
C. Branching
D. Non-procedural programming.
7. Used to write operating systems, ____________ runs faster than other 3GLs.
A. C
B. ADA
C. FORTRAN
D. SQL
8. ____________ is an event driven language introduced in 1987 that helps developers use standard Windows features.
A. C#
B. SQL
C. Visual Basic
D. C++
9. Which of the following statements is NOT true about the BIOS program?
A. BIOS retains control of the computer after verifying the operating system.
B. BIOS checks the connections for the major components.
C. BIOS copies the operating system instructions from RAM to the hard disk.
D. BIOS is the first program the computer runs when it starts up.
10. The operating system uses small programs known as ____________ to manage communication between the computer and peripherals.
A. applets
B. JavaScript
C. drivers
D. applications
11. ____________ is a low-cost, open source software program for Web server systems.
A. Apache
B. Windows CE
C. Windows 2000 Datacenter
D. Mac OS X Server
12. Which of the following statements is NOT true for utility programs?
A. Some utilities are bundled with operating system software.
B. Productivity software programs are utilities that allow users to create useful documents.
C. File compression utilities use logic to reduce file sizes.
D. File management and defragmentation are examples of utility programs.
13. If a utility program has been used to reduce file size, the file must be ____________ before it can be used again.
A. compressed
B. zipped
C. unfolded
D. decompressed
14. ____________ is the process of dividing a disk into tracks and sectors.
A. Scanning
B. Formatting
C. Fragmenting
D. Embedding
15. Which of the following statements is NOT true about the defragmenting process?
A. Defragmented files are rewritten to adjacent sectors.
B. It is possible to obtain defragmentation programs from independent vendors.
C. File retrieval is quicker after the defragmenting process is completed.
D. The defragmenting process replaces the need for file allocation tables.
16. ____________ enables Web pages to be viewed on any computer.
A. Hypertext Markup Language
B. Hyperlink Markup Protocol
C. Hypertext Transfer Protocol
D. Hyperlink Server Language
17. Data written with ____________ can be manipulated by applets on a Web page.
A. XML
B. HTML
C. Java
D. ActiveX
18. ____________ is the standard method of handling requests by applets for programmed actions on the server.
A. Script processing
B. Perl
C. CGI
D. JavaScript
19. ____________ help(s) resolve moral dilemmas.
A. Ethical principles
B. Moral behavior
C. Philosophy
D. Critical analysis
20. Which of the following is NOT a category of law relating to ethical computer usage?
A. Intellectual property rights
B. Decency
C. Business litigation
D. Criminal behavior
21. Organizations may install multiple copies of a software package if they purchase a(n):
A. site license.
B. end user license agreement.
C. registered version.
D. site permit.
22. Copyright notices should include:
A. the author’s name, date, and trademark symbol.
B. the date, copyright symbol or word, and author’s name.
C. the copyright symbol and price.
D. the copyright symbol, price, and date.
23. All of the following statements about works in the public domain are true, EXCEPT:
A. the creators hold the copyright.
B. they may be duplicated and freely distributed.
C. they include all works authored by the federal government.
D. they include all works with expired copyrights.
24. Software known as freeware:
A. is not copyrighted.
B. cannot be revised or sold to a third party.
C. may also be distributed as shareware for a small fee.
D. is usually distributed as source code.
25. ____________ is an example of open source software.
A. Unix
B. Windows
C. Palm OS
D. Linux
26. Which of the following statements about patents is NOT true?
A. Patents protect the rights of inventors of physical devices.
B. Patents are awarded by an international organization.
C. Patents protect business method-related software.
D. Programmers must obtain permission to use patented software.
27. Which of the following computer crimes can be prosecuted using existing laws against slander?
A. Piracy
B. Cybersmearing
C. Cybertrashing
D. Identity theft
28. One way to determine if an act is ethical is:
A. by considering the ultimate result, not the methods used to achieve it.
B. to act the way others would, regardless of whether society would benefit.
C. by focusing on the desired outcome and disregarding other viewpoints.
D. to consider whether an impartial observer would view your actions as fair to all involved parties.
29. A person who has obtained a college degree under false pretenses may be guilty of the crime of:
A. plagiarism.
B. fraud.
C. deceit.
D. subterfuge.
30. The process of ____________ involves research into a person’s background to learn more about their character.
A. investigation
B. vetting
C. appraisal
D. evaluation
31. Which of the following scenarios best represents an ethical action or decision?
A. Personalizing software settings in a computer lab
B. Declining a relative’s request to share software purchased with a student discount
C. Withholding information about another student’s plagiarism
D. Sharing music files via a peer-to-peer network
32. A business must have ____________ of software that is used.
A. proof of purchase for at least one copy
B. a site license for more than 50 installations
C. a legal license for each installation
D. a EULA for every copy
33. As an employee, you may be asked to sign a statement that there is no unlicensed software on your work computer. All of the following statements are reasons to be concerned about this, EXCEPT:
A. Your company has clearly written computer usage policies
B. You share your computer
C. You aren’t sure if the installed software is licensed
D. You don’t control access to your computer
34. Our relationships with friends and family have ____________ guidelines governing our behavior.
A. more restrictive
B. well-defined
C. individual ethical
D. less formalized
35. Which of the following is NOT a traditional method of generating revenue in the entertainment industry?
A. Ticket sales
B. Securing financing from interested parties
C. Sales of recorded performances
D. Incorporating advertisements with entertainment
36. The creation of ____________ files may make it easier to transmit video over the Internet.
A. MP3
B. MP4
C. MPEG-1
D. MPEG-2
1. ___________ is a set of instructions formatted to use binary numbers and used by the microprocessor.
2. Procedural and ____________ are two ways to categorize sophisticated language groups by the methods used to organize instructions.
3. The sequence of instructions written in a first generation language, consisting of zeros and ones, is known as ____________.
4. A second generation language, which allows the use of command words and decimal numbers, is known as ____________.
5. Third generation languages use a ____________ to convert commands into machine code.
6. ____________ uses blocks of commands, such as IF-THEN-ELSE, to handle different conditions in one location.
7. Providing standard tools to communicate with particular types of processors, a(n) ____________ is a special class of software.
8. The fourth generation language used to write requests for information from databases is ____________.
9. A(n) ____________ is what occurs when a user clicks on a button or uses a dialog box.
10. The source code for applications is generally written in a(n) ____________ generation language.
11. The ____________ is stored in a special memory on the motherboard and checks connections for items like the monitor and mouse.
12. The Apple Macintosh computer popularized the use of the ____________.
13. A(n) ____________ describes the combination of operating system and processor type.
14. Productivity applications often integrate a variety of useful programs and offer them as a(n) ____________.
15. ____________ is a process by which repeated words in a document are replaced by a reference number and a conversion table is created.
16. The location of data on a disk is recorded in a(n) ____________.
17. The critical analysis of fundamental assumptions or beliefs is ____________.
18. The conflict of two moral behaviors results in a ____________.
19. Accepted behavior in a group may be described by a formal ____________.
20. Copyright may belong to the employer if the employee was specifically engaged to develop the material and signed a(n) ____________ agreement.
21. A(n) ____________ is typically part of the software installation process and explains a user’s rights and limitations.
22. In order to legally use software on multiple computers, an organization may purchase a ____________.
23. If a book is not copyrighted and can be duplicated and freely distributed, it is in the ____________.
24. Corporations often spend a great deal of money to protect their ____________, which may be a name or symbol that identifies their product.
25. Inventors of physical devices or business method-related software should apply for a(n) ____________ to protect their rights.
26. Developing your own personal ____________ will help you to handle moral dilemmas.
27. Although it is not illegal, ____________ may result in failure and is prohibited by all accredited academic institutions.
28. An important part of the fair use policy states that reproduction of copyrighted materials is permitted if it does not adversely affect the ____________ value of the work.
29. Since fair use does not usually apply to businesses, it may be necessary to obtain permission and pay a special fee known as a(n) ____________ to use copyrighted material.
30. Digitally revising a photo may not be illegal, but it could be ____________ if the changes create a false impression.
31. ____________, like TiVo, are dedicated computers that are able to save digitized television signals to a hard disk.
32. Currently, Internet users are not charged for ____________ on items purchased out of state.
1. Match the following terms to their meanings:
I. Syntax A. Used to communicate with the microprocessor
II. Machine language B. Category for sophisticated language groups
III. 5GLs C. Rules governing the use of words in a language
IV. Procedural D. Program used to convert source code into machine language
V. Assembler E. Most human-like category of programming languages
Answer: C, A, E, B, D
2. Match the following terms to their meanings:
I. FORTRAN A. Feature of blocks of code used in modular programming
II. Branching B. Uses GOTO instructions
III. Structured C. Self-contained modules that include
instructions and data
programming
IV. Information hiding D. Uses blocks of commands like DO-WHILE
V. Objects E. Ability to perform different operations based on certain criteria
Answer: B, E, D, A, C
3. Match the following terms to their meanings:
I. Beep code A. Used to coordinate communication, calendars, and meetings
II. Windows CE B. BIOS error indicator
III. Apple OS C. Used in PDAs
IV. Groupware D. Popular with educators and graphic artists
V. OpenOffice E. Runs on Linux
Answer: B, C, D, A, E
4. Match the following terms to their meanings:
I. Zipping A. Setting up of sectors and clusters
II. Formatting B. Identifies bad sectors
III. Scanning C. Enables data to be sorted, filtered, or manipulated
IV. ActiveX D. Method of file compression
V. XML E. Similar to a Java applet
Answer: D, A, B, E, C
5. Match the following terms to their meanings:
I. Philosophy A. Help resolve moral dilemmas
II. Moral dilemma B. Formalized codes of behavior
III. Ethical principles C. Result of two conflicting moral behaviors
IV. Laws D. Violations may be judged by student disciplinary committee
V. Honor code E. Critical analysis of fundamental assumptions or beliefs
Answer: E, C, A, B, D
6. Match the following terms to their meanings:
I. EULA A. May permit reproduction of copyrighted work without permission
II. Work for hire B. Legal agreement between software manufacturer and buyer
III. Site license C. Code that is available as freeware
IV. Fair use D. Permits multiple software installations for an agreed number of times
V. Open source E. Agreement which may waive an individual’s right to copyright material
Answer: B, E, D, A, C
7. Match the following terms to their meanings:
I. Trademark A. Creator’s legal right to exclusive sale and reproduction of his or her work
II. Copyright B. Fee paid to author or inventor
III. Public domain C. Product name or symbol
IV. Patent D. Includes work authored by federal government
V. Royalty E. May be granted for business method-related software
Answer: C, A, D, E, B
8. Match the following terms to their meanings:
I. Plagiarism A. Investigation to uncover character flaws
II. Vetting B. Informing authorities of illegal activity
III. Course pack C. Obtaining credentials under false pretenses
IV. Whistleblowing D. Collection of copyrighted work used for educational purposes
V. Fraud E. Taking credit for someone else’s work
Answer: E, A, D, B, C