Exam 10: Application Development
Exam 1: Computer Technology: Your Need To Know60 Questions
Exam 2: Introduction to Systems Architecture90 Questions
Exam 3: Data Representation100 Questions
Exam 4: Processor Technology and Architecture103 Questions
Exam 5: Data Storage Technology100 Questions
Exam 6: System Integration and Performance100 Questions
Exam 7: Input/Output Technology99 Questions
Exam 8: Data and Network Communication Technology100 Questions
Exam 9: Computer Networks75 Questions
Exam 10: Application Development76 Questions
Exam 11: Operating Systems75 Questions
Exam 12: File and Secondary Storage Management77 Questions
Exam 13: Internet and Distributed Application Services93 Questions
Exam 14: System Administration75 Questions
Select questions type
Binary CPU instructions, called ____, are the earliest programming languages.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Software programs
____ models provide the detail needed to develop a system that meets users' needs.
Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
B
A program's ____ version omits the symbol table and debugging checkpoints to reduce program size and increase execution speed.
(Multiple Choice)
4.9/5
(39)
____ are integrated collections of models, tools, techniques, and processes.
(Multiple Choice)
4.9/5
(26)
Software has surpassed hardware to become the most costly component of most information systems.
(True/False)
4.8/5
(39)
A(n) ____________________ is an automated tool for testing executable programs.
(Short Answer)
5.0/5
(33)
Reduced productivity, dissatisfied customers, and poor managerial decisions are just a few indirect costs of software that doesn't address users' needs completely or correctly.
(True/False)
4.8/5
(26)
A 5GL program contains nonprocedural rules that mimic the rules people use to solve problems.
(True/False)
4.7/5
(27)
A(n) ____________________ provides extensive security controls to prevent programs from accessing unauthorized resources or damaging the hardware, OS, or file system.
(Short Answer)
4.8/5
(36)
A symbolic debugger uses the symbol table, memory map, and source code files to trace memory addresses to specific source code statements and variables.
(True/False)
4.8/5
(41)
____________________ assist programmers in writing syntactically correct code by verifying syntax as the code is being typed and highlighting errors.
(Short Answer)
4.9/5
(34)
A ____ is a source code instruction that controls the execution of other source code instructions.
(Multiple Choice)
4.8/5
(29)
Unlike 2GL programs, 3GL programs must be translated into binary CPU instructions before the program is executed.
(True/False)
4.9/5
(34)
User needs are stated in general or abstract terms in basic computer language.
(True/False)
4.9/5
(35)
____ programming languages guarantee program portability between other OSs and application programs.
(Multiple Choice)
4.7/5
(33)
A ____ defines the name and data type of program variables.
(Multiple Choice)
4.8/5
(34)
A(n) ____________________ lists the memory location of every function and program variable, and a programmer can use it to trace error messages containing memory addresses to corresponding program statements and variables.
(Short Answer)
4.9/5
(25)
Showing 1 - 20 of 76
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)