Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
Which of the following is probably legal?
A) You buy a computer game and make copies for your friends.
B) You and your buddies pool your money to buy software, which you share.
C) You buy one copy of a piece of software, but install it on your laptop and desktop computer.
D) You buy one copy of a piece of software, but install it at home, your office, and on your spouse's laptop.
Q:
Which is a way in which the online world is different from the usual offline interactions?
A) Our range of interactions is much broader than it was when we lived in villages.
B) Families and relatives influence our online behavior very little.
C) We can be anonymous on the Internet.
D) All of the above
Q:
Passwords:
A) are maintained on a list by the system administrator
B) can be viewed by a superuser
C) must be changed monthly
D) are encrypted and are compared using the encryption, not "clear text"
Q:
The textbook author advocates:
A) changing passwords at least once per year
B) using a different password for every account
C) using three different passwords
D) ignoring password policies of employers
Q:
Before forwarding email, you should:
A) get the sender's permission
B) notify the sender that you are forwarding it
C) send a disclaimer
D) all of the above
Q:
Most email is:
A) private
B) copyrighted
C) easy to forward
D) subject to censorship
Q:
All of the following are difficult to convey in an email message except:
A) emotion
B) sarcasm
C) emphasis
D) ambiguity
Q:
When software is "acting strange," you should:
A) not become alarmed; it's probably a minor glitch
B) save your work with a new file name, exit, and restart
C) immediately shutdown the computer
D) reinstall the software program
Q:
It is legal to give commercial software to your friends, but not to sell it.
Q:
Information is placed in the public domain, meaning that it is free for anyone to use, in any form.
Q:
One-way ciphers are reversible; in other words, they can be decoded.
Q:
Any email that appears to give you something for nothing can safely be deleted. The world just doesn't work that way.
Q:
If your software is "acting" strange or your computer is "behaving" unusually, these could be indicators of a software problem such as disk fragmentation or a computer virus infection.
Q:
Most email in the United States is a private conversation between only the sender and the recipient.
Q:
When a new password is created for your computer system, it is scrambled or encrypted and then stored in that form.
Q:
You should never forward an email without the sender's permission.
Q:
The word netiquette only applies to etiquette for email.
Q:
It is possible with the help of Internet service providers (ISPs) and companies like Microsoft to figure out who is online.
Q:
Web pages cannot be copyrighted.
Q:
Determining if email is spam is really just a program's best guess, and some mistakes are inevitable.
Q:
For your work to have copyright protection, the copyright symbol, , must be listed on your work.
Q:
The use of shareware implies the obligation to pay for it.
Q:
With stringent laws against spam in many places, and spammers being prosecuted, spam is no longer a common problem.
Q:
When choosing a security question that will be used to challenge your identity in the event of a forgotten password, the security question should have an answer that has not been publically disclosed.
Q:
A password should never be written down.
Q:
A well-conceived password should be easy to remember and difficult to guess.
Q:
The majority of participants in crowdsourcing are typically motivated by large monetary rewards for themselves.
Q:
Email backlogs should be answered in the order they were received.
Q:
Including the question with the reply is a courtesy; it provides the context for your answer.
Q:
One message covering multiple topics is better than multiple messages, each with a single topic.
Q:
It is impossible to convey emotion in an email.
Q:
When communicating via email, it is important to remember that you aren't there in person, so you should explain yourself more completely.
Q:
________ has developed licenses that allow works to be shared easily.
Q:
Software for which the program is publicly available is known as ________software.
Q:
The first top-level ________ are .com, .gov, .edu, .mil, .int, .org, and .net.
Q:
A(n) ________ refers to the legal protection of many forms of intellectual property.
Q:
The Nigerian Widow scam is an example of a(n) ________ fraud.
Q:
________ is the data to be transformed during the computation to produce the output.
Q:
________ means to exactly specify every step in the sequence of operations for transforming the input into the output.
Q:
A(n) ________ is a guideline used to solve a problem that can, but may not, result in a solution.
Q:
The property of ________ means that an algorithm must eventually stop.
Q:
A(n) ________ is an idea or concept extracted from a specific situation.
Q:
________ is the data resulting from the computation, the intended result.
Q:
An algorithm that has no successful end to it violates the ________ property.
Q:
A(n) ________, such as JavaScript, is a formal notation used to precisely define an algorithm.
Q:
English is an example of a(n) ________ language.
Q:
A precise, systematic method for producing a specified result is a(n) ________.
Q:
A heuristic process:
A) is guaranteed to work 100 percent of the time
B) yields the specified answer or reports back that no such answer exists
C) provides guidelines for finding a solution
D) all of the above
Q:
Programmers use programming languages instead of natural languages because programming languages:
A) are extremely easy to learn
B) allow only a limited number of possible solutions for a specific problem
C) are precise and unambiguous
D) allow more details to be omitted
Q:
Instruction sequences that repeat are called:
A) loops
B) assumptions
C) tests
D) sorting
Q:
The correct order from lowest to highest level of detail of the same program is:
A) assembly language, programming language, and binary
B) programming language, assembly language, and binary
C) binary, assembly language, and programming language
D) binary, programming language, and assembly language
Q:
The intersect of an alphabetized list (IAL) and the No Alphabetized Lists (NAL) are different solutions because they:
A) require different forms of the input
B) rely on the characteristics of the input
C) have different running times
D) all of the above
Q:
Different algorithms for the same problem can:
A) solve the same problem differently
B) take different amounts of processing time
C) mean that one algorithm is preferred over others
D) all of the above
Q:
Which of the following is an example of definiteness?
A) Add and multiply values A, B, and C to obtain the result.
B) Add A and B. Divide the sum by C. If C = 0, the solution is "undefined."
C) Use multiplication and addition operations to solve the problem.
D) All of the above
Q:
Algorithms should:
A) be written to solve one specific case
B) use resources efficiently
C) only be clear to the algorithm designer
D) be ambiguous to allow creativity
Q:
Which of the following lacks finiteness?
A) Bake for 50 minutes at 375 degrees.
B) Read Chapter 10.
C) Repeat until you get to the end of the file.
D) Find pi.
Q:
Which of the following is a good example of effectiveness?
A) Add 1 to the total number of students registered.
B) Subtract the amount spilled from the amount in the glass.
C) Add next month's rainfall to this month's.
D) Enter the test score you would have gotten had you studied harder.
Q:
A computer algorithm must have:
A) a specified input and output
B) definiteness
C) effectiveness
D) all of the above
Q:
Anyone who creates an algorithm needs to know why it works.
Q:
A heuristic process is an example of an algorithm.
Q:
The way to know that an algorithm works is to know what properties the computation has that cause it to produce the right result every time, and to be able to explain how they do the job.
Q:
Programs containing loops can be verified exhaustively, that is, by trying all cases.
Q:
A possible output for some computations is a statement that there is no output"that is, there is no possible solution.
Q:
A loop in an algorithm must include some test which can end the repetition.
Q:
An algorithm must contain a loop.
Q:
An algorithm must be a systematic method for producing a specified result.
Q:
Replacing nouns with pronouns in a natural language algorithm will make the algorithm more understandable.
Q:
Algorithms always use functions"operations that the agent already knows how to perform"to simplify the algorithmic description.
Q:
To be effective, an algorithm needs outside help and further input.
Q:
The sequence of commands is important in an algorithm.
Q:
The type of data, the amount of data, and the form of the data that the algorithm expects. must be specified.
Q:
Algorithms are rare and seldom used outside of the field of computers.
Q:
Memory locations are identified by a numbers called ________.
Q:
_________ connect to the processors input and output ports, providing it with input or receiving its output.
Q:
A(n) ________ allows the processor to complete instructions faster than one per every five ticks by starting each before finishing the last, like an automobile assembly line.
Q:
The ________ Cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.
Q:
Modern computers are developed with ________, the most widely used integrated circuit technology.
Q:
A(n) ________ is a connector between two wires that controls whether they are electrically connected.
Q:
A(n) ________ is a force one object can have on another without touching it.
Q:
A(n) ________ is a light-sensitive material used to make a chip.