CSC101: Introduction to Computer Education

Fall 2007

 

Assignment 3 Solution

 

Multiple Choice:      

1.             ____________ identifies the ways that words are used in a language.

A.     Programming

B.     Framework

C.     Syntax

D.     Semantics

Answer: C      

2.             Object oriented programming is an example of:

A.     a first generation language.

B.     a sophisticated language group.

C.     a machine-like language.

D.     an assembly language.

Answer: B      

3.             Since no translation is needed, instructions written in machine language:

A.     are easy to read.

B.     are written in English.

C.     use Unicode.

D.     execute quickly.

Answer: D      

4.             The use of assembly language is limited because:

A.     the source code is specific to the hardware.

B.     it can only be used when processor power is high.

C.     it is not possible to use it for complex commands.

D.     it cannot convert source code into machine code.

Answer: A      

5.         The early 3GL used for accounting and payroll is:

A.     COBOL.

B.     FORTRAN.

C.     ADA.

D.     C#.

Answer: A      

6.         ____________ uses blocks of code to handle standard procedures.

A.     Structured programming

B.     Modular programming

C.     Branching

D.     Non-procedural programming.

Answer: B      

7.         Used to write operating systems, ____________ runs faster than other 3GLs.

A.     C

B.     ADA

C.     FORTRAN

D.     SQL

Answer: A         

8.         ____________ is an event driven language introduced in 1987 that helps developers use standard Windows features.

A.     C#

B.     SQL

C.     Visual Basic

D.     C++

Answer: C      

9.        Which of the following statements is NOT true about the BIOS program?

A.     BIOS retains control of the computer after verifying the operating system.

B.     BIOS checks the connections for the major components.

C.     BIOS copies the operating system instructions from RAM to the hard disk.

D.     BIOS is the first program the computer runs when it starts up.

Answer: A      

10.         The operating system uses small programs known as ____________ to manage communication between the computer and peripherals.

A.     applets

B.     JavaScript

C.     drivers

D.     applications

Answer: C      

11.         ____________ is a low-cost, open source software program for Web server systems.

A.     Apache

B.     Windows CE

C.     Windows 2000 Datacenter

D.     Mac OS X Server

Answer: A      

12.       Which of the following statements is NOT true for utility programs?

A.     Some utilities are bundled with operating system software.

B.     Productivity software programs are utilities that allow users to create useful documents.

C.     File compression utilities use logic to reduce file sizes.

D.     File management and defragmentation are examples of utility programs.

Answer: B      

13.         If a utility program has been used to reduce file size, the file must be ____________ before it can be used again.

A.     compressed

B.     zipped

C.     unfolded

D.     decompressed

Answer: D      

14.         ____________ is the process of dividing a disk into tracks and sectors.

A.     Scanning

B.     Formatting

C.     Fragmenting

D.     Embedding

Answer: B      

15.         Which of the following statements is NOT true about the defragmenting process?

A.     Defragmented files are rewritten to adjacent sectors.

B.     It is possible to obtain defragmentation programs from independent vendors.

C.     File retrieval is quicker after the defragmenting process is completed.

D.     The defragmenting process replaces the need for file allocation tables.

Answer: D      

16.          ____________ enables Web pages to be viewed on any computer.

A.     Hypertext Markup Language

B.     Hyperlink Markup Protocol

C.     Hypertext Transfer Protocol

D.     Hyperlink Server Language

Answer: A      

17.       Data written with ____________ can be manipulated by applets on a Web page.

A.     XML

B.     HTML

C.     Java

D.     ActiveX

Answer: A      

18.         ____________ is the standard method of handling requests by applets for programmed actions on the server.

A.     Script processing

B.     Perl

C.     CGI

D.     JavaScript

Answer: C      

19.        ____________ help(s) resolve moral dilemmas.

A.     Ethical principles

B.     Moral behavior

C.     Philosophy

D.     Critical analysis

Answer: A      

20.            Which of the following is NOT a category of law relating to ethical computer usage?

A.     Intellectual property rights

B.     Decency

C.     Business litigation

D.     Criminal behavior

Answer: C      

21.       Organizations may install multiple copies of a software package if they purchase a(n):

A.     site license.

B.     end user license agreement.

C.     registered version.

D.     site permit.

Answer: A      

22.         Copyright notices should include:

A.     the author’s name, date, and trademark symbol.

B.     the date, copyright symbol or word, and author’s name.

C.     the copyright symbol and price.

D.     the copyright symbol, price, and date.

Answer: B      

23.         All of the following statements about works in the public domain are true, EXCEPT:

A.     the creators hold the copyright.

B.     they may be duplicated and freely distributed.

C.     they include all works authored by the federal government.

D.     they include all works with expired copyrights.

Answer: A      

24.         Software known as freeware:

A.     is not copyrighted.

B.     cannot be revised or sold to a third party.

C.     may also be distributed as shareware for a small fee.

D.     is usually distributed as source code.

Answer: B      

25.         ____________ is an example of open source software.

A.     Unix

B.     Windows

C.     Palm OS

D.     Linux

Answer: D      

26.         Which of the following statements about patents is NOT true?

A.     Patents protect the rights of inventors of physical devices.

B.     Patents are awarded by an international organization.

C.     Patents protect business method-related software.

D.     Programmers must obtain permission to use patented software.

Answer: B      

27.         Which of the following computer crimes can be prosecuted using existing laws against slander?

A.     Piracy

B.     Cybersmearing

C.     Cybertrashing

D.     Identity theft

Answer: B      

28.         One way to determine if an act is ethical is:

A.     by considering the ultimate result, not the methods used to achieve it.

B.     to act the way others would, regardless of whether society would benefit.

C.     by focusing on the desired outcome and disregarding other viewpoints.

D.     to consider whether an impartial observer would view your actions as fair to all involved parties.

Answer: D      

29.        A person who has obtained a college degree under false pretenses may be guilty of the crime of:

A.     plagiarism.

B.     fraud.

C.     deceit.

D.     subterfuge.

Answer: B      

30.       The process of ____________ involves research into a person’s background to learn more about their character.

A.     investigation

B.     vetting

C.     appraisal

D.     evaluation

Answer: B      

31.          Which of the following scenarios best represents an ethical action or decision?

A.     Personalizing software settings in a computer lab

B.     Declining a relative’s request to share software purchased with a student discount

C.     Withholding information about another student’s plagiarism

D.     Sharing music files via a peer-to-peer network

Answer: B      

32.         A business must have ____________ of software that is used.

A.     proof of purchase for at least one copy

B.     a site license for more than 50 installations

C.     a legal license for each installation

D.     a EULA for every copy

Answer: C      

33.         As an employee, you may be asked to sign a statement that there is no unlicensed software on your work computer. All of the following statements are reasons to be concerned about this, EXCEPT:

A.     Your company has clearly written computer usage policies

B.     You share your computer

C.     You aren’t sure if the installed software is licensed

D.     You don’t control access to your computer

Answer: A      

34.         Our relationships with friends and family have ____________ guidelines governing our behavior.

A.     more restrictive

B.     well-defined

C.     individual ethical

D.     less formalized

Answer: D      

35.         Which of the following is NOT a traditional method of generating revenue in the entertainment industry?

A.     Ticket sales

B.     Securing financing from interested parties

C.     Sales of recorded performances

D.     Incorporating advertisements with entertainment

Answer: B      

36.         The creation of ____________ files may make it easier to transmit video over the Internet.

A.     MP3

B.     MP4

C.     MPEG-1

D.     MPEG-2

Answer: B                 

 

Fill in Blank

1.    ___________ is a set of instructions formatted to use binary numbers and used by the microprocessor.

Answer: Machine language      

2.    Procedural and ____________ are two ways to categorize sophisticated language groups by the methods used to organize instructions.

Answer:, object oriented programming (OOP)

3.    The sequence of instructions written in a first generation language, consisting of zeros and ones, is known as ____________.

Answer: machine code            

4.    A second generation language, which allows the use of command words and decimal numbers, is known as ____________.

Answer: assembly language     

5.    Third generation languages use a ____________ to convert commands into machine code.

Answer: compiler                    

6.        ____________ uses blocks of commands, such as IF-THEN-ELSE, to handle different conditions in one location.

Answer: Structured programming

7.          Providing standard tools to communicate with particular types of processors, a(n) ____________ is a special class of software.

Answer: operating system        

8.    The fourth generation language used to write requests for information from databases is ____________.

Answer: structured query language (SQL)

9.    A(n) ____________ is what occurs when a user clicks on a button or uses a dialog box.

Answer: event                        

10.    The source code for applications is generally written in a(n) ____________ generation language.

Answer: third                          

11.    The ____________ is stored in a special memory on the motherboard and checks connections for items like the monitor and mouse.

Answer: Basic Input/Output System (BIOS)

12.    The Apple Macintosh computer popularized the use of the ____________.

Answer: graphical user interface (GUI)

13.    A(n) ____________ describes the combination of operating system and processor type.

Answer: platform                    

14.    Productivity applications often integrate a variety of useful programs and offer them as a(n) ____________.

Answer: suite                          

15.    ____________ is a process by which repeated words in a document are replaced by a reference number and a conversion table is created.

Answer: File compression        

16.    The location of data on a disk is recorded in a(n) ____________.

Answer: file allocation table (FAT)

17.     The critical analysis of fundamental assumptions or beliefs is ____________.

Answer: philosophy                 

18.     The conflict of two moral behaviors results in a ____________.

Answer: moral dilemma           

19.     Accepted behavior in a group may be described by a formal ____________.

Answer: code of ethics            

20.     Copyright may belong to the employer if the employee was specifically engaged to develop the material and signed a(n) ____________ agreement.

Answer: work for hire             

21.     A(n) ____________ is typically part of the software installation process and explains a user’s rights and limitations.

Answer: end user license agreement (EULA)

22.     In order to legally use software on multiple computers, an organization may purchase a ____________.

Answer: site license                

23.     If a book is not copyrighted and can be duplicated and freely distributed, it is in the ____________.

Answer: public domain            

24.     Corporations often spend a great deal of money to protect their ____________, which may be a name or symbol that identifies their product.

Answer: trademark                 

25.      Inventors of physical devices or business method-related software should apply for a(n) ____________ to protect their rights.

Answer: patent                       

26.     Developing your own personal ____________ will help you to handle moral dilemmas.

Answer: ethics                        

27.     Although it is not illegal, ____________ may result in failure and is prohibited by all accredited academic institutions.

Answer: plagiarism                  

28.     An important part of the fair use policy states that reproduction of copyrighted materials is permitted if it does not adversely affect the ____________ value of the work.

Answer: market                      

29.     Since fair use does not usually apply to businesses, it may be necessary to obtain permission and pay a special fee known as a(n) ____________ to use copyrighted material.

Answer: royalty                      

30.     Digitally revising a photo may not be illegal, but it could be ____________ if the changes create a false impression.

Answer: unethical                   

31.     ____________, like TiVo, are dedicated computers that are able to save digitized television signals to a hard disk.

Answer: Personal video recorders (PVR)

32.     Currently, Internet users are not charged for ____________ on items purchased out of state.

Answer: sales tax                    

 

       

 

Matching

 

1.   Match the following terms to their meanings:

            I.    Syntax                    A. Used to communicate with the microprocessor

            II.   Machine language   B. Category for sophisticated language groups

            III. 5GLs                      C. Rules governing the use of words in a language

            IV. Procedural              D. Program used to convert source code into machine language

            V.  Assembler              E. Most human-like category of programming languages

Answer: C, A, E, B, D             

2.   Match the following terms to their meanings:

            I.    FORTRAN             A. Feature of blocks of code used in modular programming

            II.   Branching               B. Uses GOTO instructions

            III. Structured               C. Self-contained modules that include instructions and data
                  programming

            IV. Information hiding    D. Uses blocks of commands like DO-WHILE

            V.  Objects                   E. Ability to perform different operations based on certain criteria

Answer: B, E, D, A, C             

3.   Match the following terms to their meanings:

            I.    Beep code              A. Used to coordinate communication, calendars, and meetings

            II.   Windows CE           B. BIOS error indicator

            III. Apple OS                C. Used in PDAs

            IV. Groupware              D. Popular with educators and graphic artists

            V.  OpenOffice             E. Runs on Linux

Answer: B, C, D, A, E             

4.   Match the following terms to their meanings:

            I.    Zipping                   A. Setting up of sectors and clusters

            II.   Formatting              B. Identifies bad sectors

            III. Scanning                 C. Enables data to be sorted, filtered, or manipulated

            IV. ActiveX                  D. Method of file compression

            V.  XML                      E. Similar to a Java applet

Answer: D, A, B, E, C             

 

5.   Match the following terms to their meanings:

            I.    Philosophy              A. Help resolve moral dilemmas

            II.   Moral dilemma        B. Formalized codes of behavior

            III. Ethical principles     C. Result of two conflicting moral behaviors

            IV. Laws                      D. Violations may be judged by student disciplinary committee

            V.  Honor code             E. Critical analysis of fundamental assumptions or beliefs

Answer: E, C, A, B, D             

6.   Match the following terms to their meanings:

            I.    EULA                    A. May permit reproduction of copyrighted work without permission

            II.   Work for hire          B. Legal agreement between software manufacturer and buyer

            III. Site license              C. Code that is available as freeware

            IV. Fair use                  D. Permits multiple software installations for an agreed number of times

            V.  Open source           E. Agreement which may waive an individual’s right to copyright material

Answer: B, E, D, A, C             

7.   Match the following terms to their meanings:

            I.    Trademark              A. Creator’s legal right to exclusive sale and reproduction of his or her work

            II.   Copyright                B. Fee paid to author or inventor

            III. Public domain          C. Product name or symbol

            IV. Patent                     D. Includes work authored by federal government

            V.  Royalty                   E. May be granted for business method-related software

Answer: C, A, D, E, B             

8.   Match the following terms to their meanings:

            I.    Plagiarism               A. Investigation to uncover character flaws

            II.   Vetting                   B. Informing authorities of illegal activity

            III. Course pack            C. Obtaining credentials under false pretenses

            IV. Whistleblowing        D. Collection of copyrighted work used for educational purposes

            V.  Fraud                      E. Taking credit for someone else’s work

Answer: E, A, D, B, C