Exam 18: Limitations of Computing
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
A walk-through is a verification method in which a team member reads the program or design aloud line by line and other team members point out errors.
(True/False)
4.8/5
(39)
Which of the following make it possible to determine which bit or digit is incorrect when an error is detected?
(Multiple Choice)
4.9/5
(37)
_______________ notation expresses computing time as a term in the function that increases most rapidly relative to the size of the problem.
(Short Answer)
4.7/5
(35)
Which of the following is the Big-O notation for exponential time?
(Multiple Choice)
4.9/5
(34)
What is the number of errors per line of code that can be expected in good software?
(Multiple Choice)
4.7/5
(35)
Which of the following is the Big-O notation for linear time?
(Multiple Choice)
4.8/5
(37)
In which of the following does a team perform a manual simulation of a program or design?
(Multiple Choice)
4.8/5
(35)
Software testing is capable of proving the absence of bugs in software.
(True/False)
4.9/5
(33)
Underflow is the condition that occurs when the results of a calculation are too small to represent in a given machine.
(True/False)
4.7/5
(38)
The computer term "bug" arose from an incident in which a moth got into a computer cabinet.
(True/False)
4.9/5
(40)
A design flaw in a microprocessor chip will not result in periodic errors compromising expected component limits and calculations.
(True/False)
4.9/5
(41)
Which of the following uses an extra bit to check the validity of a stored or transferred byte of data?
(Multiple Choice)
5.0/5
(39)
A(n) _______________ is designed to stimulate discussion about the way a programmer chose to design or implement the program's requirements.
(Short Answer)
4.8/5
(45)
If a polynomial time solution using one processor can be found for any _______________ problem, then such a solution exists for every such problem.
(Short Answer)
4.9/5
(32)
Which algorithm complexity is not dependent on the size of a problem?
(Multiple Choice)
4.9/5
(41)
Software requirements are broad but precise statements outlining what is to be provided by a software product.
(True/False)
4.8/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)