Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
MP3 is popular for Internet transmission because it yields higher quality even though this also requires higher bandwidth requirements.
Q:
To play a digitized sound, the numbers are read from memory into a digital-to-analog converter (DAC), which creates an electrical wave that is then input to a speaker.
Q:
When digitizing sound, a slower sampling rate does not affect the recorded wave since there are some frequencies that the human ear can't hear.
Q:
Digitizing a sound wave requires that the analog wave be converted to bits.
Q:
An object creates sound by vibrating in a medium. The force, or intensity of the push, determines the pitch, and the frequency (the number of waves per second) of the pushes is the volume.
Q:
Active Matrix displays are the standard "flat" or "thin" displays used for laptops, phones, and most familiar video applications.
Q:
To represent the color of a single pixel requires three bytes.
Q:
Contrast is the size of the difference between the darkest and lightest pixels.
Q:
All colors with equal intensities of the RGB subpixels are always some shade of gray.
Q:
RGB, the name for a color encoding method, is an acronym for red, green, blue.
Q:
Each pixel on a computer display is formed from three colored lights: red, yellow, and blue.
Q:
_______ is a way of representing Unicode using variable-length codes.
Q:
A(n) ________ sequence is an ordering for a set of symbols used to sort them; for example, alphabetical ordering.
Q:
A coding scheme using 8-bit symbols has ________ possible combinations.
Q:
________ is a property of binary numbers in which the number of 1-bits is even. It can be used by the hardware to detect that an error has occurred.
Q:
________ refers to whether a number is odd or even.
Q:
The number of digits is the ________ of the numbering system.
Q:
________ are the most common way to provide metadata.
Q:
________ is information describing the properties of other information.
Q:
Four bits is called a(n) ________.
Q:
Although ASCII and its variations are widely used, the more complete solution is a representation, called ________, which uses more than one byte (up to four) to encode about 100,000 symbols.
Q:
An 8-bit sequence on the computer is called a(n) ________.
Q:
In binary representations, an encoding that switches 0s to 1s, and 1s to 0s, is called ________.
Q:
The familiar UPC bar code uses more than the minimum number of bits to code symbols
A) so the code will fill up the required amount of space on the package
B) so the reader can tell whether or not the product is upside down
C) so additional information can be coded
D) to allow for expansion in the future
Q:
How many digits are there in the hexadecimal system?
A) 2
B) 4
C) 10
D) 16
Q:
The PandA system:
A) contains gray
B) is formed from 256 letter representations
C) has 10 digits
D) is binary
Q:
Using even parity, a normal byte, for example, 1010 0011, would:
A) include a ninth bit set to 1
B) include a ninth bit set to 0
C) not make use of a ninth bit
D) use a ninth bit to determine exactly which bit was changed if an error occurred
Q:
The NATO broadcast alphabet:
A) encodes all digits using unusual names
B) is very efficient minimizing the amount of memory needed to store each letter
C) encodes letters as words
D) makes it difficult to distinguish between different letters
Q:
This refers to whether a number is even or odd.
A) the place system
B) parity
C) PandA
D) computer memory
Q:
Extended ASCII code:
A) was developed in the United States
B) was adopted by IBM as the standard for character representation
C) is now known as ISO-8859-1
D) all of the above
Q:
The original version of ASCII used:
A) 4-bit code
B) 7-bit code
C) 8-bit code
D) 16-bit code
Q:
The Hawaiian alphabet has 18 symbols. How many bits are needed to represent just these symbols?
A) 2
B) 4
C) 5
D) 16
Q:
What does ASCII stand for?
A) Algorithmic Sequence of Computer Integrated Information
B) All Standards Complete Initialization Interface
C) Aspiring Students Confused by Incoherent Incantations
D) American Standard Code for Information Interchange
Q:
How many bits does each hex digit require?
A) 2
B) 4
C) 16
D) Hex is not measured in bits.
Q:
The binary number 101 represents the decimal number:
A) 3
B) 5
C) 7
D) 9
Q:
This places information in order by using non-digit symbols.
A) Collating Sequence
B) PandA Representation
C) Bytes
D) All of the above
Q:
The 7-bit ASCII codes are part of UTF-8.
Q:
Place value representation is associated with decimal numbers (base 10), but it does not apply to the binary numbers.
Q:
The original spelling of byte came about because of a spelling error.
Q:
The tag characters included with the content characters of the Oxford English Dictionary increase the size of the file compared with plain text.
Q:
An important property of metadata is that it is intertwined with the information that it describes.
Q:
The PandA unit is known as a bit.
Q:
A contraction for binary digit, the term bit was originally adopted because early computer designers interpreted the two patterns as 1 and 0, the digits of the binary number system.
Q:
A red, yellow, and green traffic light is a good example of a binary system.
Q:
Extended ASCII is a 9-bit code.
Q:
A key property of the PandA representation is that it is discrete; that is, the phenomenon is either present or it is not; the logic is either true or false.
Q:
The byte is the standard unit for computer memory.
Q:
A bit is larger than a byte.
Q:
We can be assured that the software running safety-critical systems is perfect.
Q:
If our computer isn't working, it is probably our own fault.
Q:
Perfectly safe software is possible through extensive program testing.
Q:
One of the first steps in debugging is to call tech support.
Q:
The print ________ is a place where printing tasks wait before being processed.
Q:
Bypassing an error with an alternative approach is called a(n) ________.
Q:
When your cars don't start, you figure out whether the battery is dead or whether the fuel tank is empty using the process of ________.
Q:
In programming, a precise definition of the input; how the system should behave and
how the output should be produced is known as a(n) ________.
Q:
________ is the goal of software programs to be reliable in safety-critical situations, such as life support.
Q:
Most hardware failures caused by manufacturing problems show up after only a few hours of operation. This is known as the:
A) "infant mortality" property
B) "redundancy factor" property
C) "early failure" property
D) "specification failure" property
Q:
To assist with HTML debugging, errors discovered by Firefox while rendering a page can be listed by going to the:
A) HTML Debugger
B) Web Console
C) Diagnostic Analyzer
D) HTML Compiler
Q:
A kind of software that translates a programming language into machine instructions is a(n):
A) algorithm
B) compiler
C) driver
D) browser
Q:
A nanosecond is:
A) 1/100th of a second
B) 1/1,000th of a second
C) 1/1,000,000th of a second
D) 1/1,000,000,000th of a second
Q:
How are hardware failures generally resolved?
A) employing a staff for 24 hour support
B) buying only hardware that does not break
C) by testing using the specification
D) using techniques such as redundancy
Q:
In Firefox, what tool can you use to see the errors on a Web page?
A) Help menu
B) Web Console
C) Tech Support section
D) Firefox has no such tool.
Q:
What is the first step of debugging?
A) Generate a theory to explain the problem.
B) Check "obvious" error sources.
C) Check that the error is reproducible.
D) Isolate the problem.
Q:
In software, a program that continues to operate but with possibly degraded functionality is called:
A) fault-tolerant
B) bug-safe
C) fail-safe
D) fail-soft
Q:
In software, a program that stops operating to avoid harm is called:
A) fault-tolerant
B) bug-safe
C) fail-safe
D) fail-soft
Q:
Fixing one error can reveal others you didn't realize were present.
Q:
A basic strategy of debugging is to isolate the problem by dividing the operation into those parts that are working and those that are not.
Q:
Debugging relies on logical reasoning and is learned by experience.
Q:
The term bug for a glitch in a computer system evolved from an incident surrounding the Volkswagen Beetle.
Q:
Sometimes unnecessary changes are made during the debugging process.
Q:
It is practically impossible to have bug-free software.
Q:
Debugging principles are not limited to IT.
Q:
The basic premise of fail-soft and fail-safe design strategies is to continue to operate as long as productive service is safely provided, but when that isn't possible, to avoid negative outcomes by stopping entirely.
Q:
Testing and other techniques can give us confidence that software works "under abnormal circumstances."
Q:
A(n) ________ search means looking only on one site.
Q:
The order in which hits are returned to a query is determinedat least in partby a number Google calls the ________.
Q:
Including a(n) ________ sign in front of the number tells Google not to ignore it and to use it as part of the query.
Q:
A logical ________ specifies a logical relationship between the words it connects.
Q:
Multiple word queries typed into a search engine are generally ________-queries.