Exam 12: Computer Programming
Exam 1: Computers and Digital Basics170 Questions
Exam 2: Computer Hardware175 Questions
Exam 3: Computer Software175 Questions
Exam 4: Operating Systems and File Management175 Questions
Exam 5: Lans and Wlans175 Questions
Exam 6: The Internet175 Questions
Exam 7: The Web and E-Mail175 Questions
Exam 8: Digital Media175 Questions
Exam 9: The Computer Industry: History, Careers, and Ethics175 Questions
Exam 10: Information Systems Analysis and Design175 Questions
Exam 11: Databases175 Questions
Exam 12: Computer Programming175 Questions
Select questions type
The ____ prompt allows you to query a set of Prolog facts and rules.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
B
Executing a ____ command directs the computer to a different section of the program.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
D
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Any class from which attributes can be inherited
Responses:
declarative paradigm
C++
superclass
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.7/5
(27)
Correct Answer:
____ is used in Prolog to produce information that is not implicitly stored in a database.
(Multiple Choice)
4.9/5
(27)
Today's operating systems, utilities, and application software are full of defects that create security ____________________, which are exploited by black hats.
(Short Answer)
4.8/5
(34)
Critical Thinking questions (Multiple Choice) Suppose you have learned that each topping adds $.50 to the price of a pizza. In order to factor this topping information into all classes that inherit the Pizza class, you should add an integer type attribute named pizzaTopping to ____.
(Multiple Choice)
4.7/5
(30)
Many declarative languages use a collection of facts and steps to describe a problem.
(True/False)
4.7/5
(31)
A bank security officer might use a(n) ____________________ to examine the different ways in which a bank vault could be compromised.
(Short Answer)
4.8/5
(27)
The branches of a(n) ____ tree represent actions that attackers might take to achieve the objective.
(Multiple Choice)
4.8/5
(39)
Which are the two languages most commonly used for professional software development?
(Multiple Choice)
4.9/5
(39)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Exemplified by a key press
Responses:
computer program
subroutine
Prolog variable
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(29)
____________________ code is wrapped in a sort of security blanket that contains the name of the software developer and ensures that the software will not run if even one bit of the source code is changed by a virus or any other factor.
(Short Answer)
4.9/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
FORmula TRANslator, primarily used for scientific applications
Responses:
event
debugger
algorithm
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(32)
Social ____ exploits pit attackers directly against consumers and the techniques for fending off such attacks are typically out of the hands of programmers.
(Multiple Choice)
4.9/5
(39)
Case 2 Robert wants to design a program for ordering pizza. He has completed a flowchart that illustrates how the computer should proceed through the instructions in the final program. The shape, price, and size of the pizza are presented as input. The output expresses which pizza is the best deal after being asked for a decision on the input. He has also created a UML (Unified Modeling Language) diagram. The pizza program will continue to operate on new sets of input data provided the computation section is wrapped in a ____.
(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 175
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)