Exam 19: broad concept of computer security and its importance in modern society.
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
Why are binary digits used to represent information on a computer?
Free
(Essay)
4.7/5
(36)
Correct Answer:
The devices used to store and manage data on a computer are cheaper and more reliable if they only have to represent two possible states. Every electrical signal is considered to be either "low" or "high" that maps to the binary digits 0 and 1.
Explain what is meant by a compression ratio of 3/4.
Free
(Essay)
4.9/5
(39)
Correct Answer:
The size of the compressed data divided by the size of the original data is 3/4. Thus, the data was compressed by 25%.
Match the cryptography term to its description.
-Based on a pair of corresponding cipher keys.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
What role did Dutch computer scientist Edsger Dijkstra have in the development in high-level programming language design?
(Essay)
4.8/5
(40)
Write the Pep/9 machine language instruction that loads the contents of location 0002 into the accumulator (the opcode for Load Word into Accumulator is 1100).
(Short Answer)
4.9/5
(43)
_______________ is a language feature that enforces information hiding.
(Essay)
4.8/5
(38)
Which of the following does not characterize the imperative (procedural) paradigm for high level programming languages?
(Multiple Choice)
4.9/5
(41)
Drawing boxes for variables and filling in the values is part of following an algorithm, whereas asking questions and deferring details is part of _______________ an algorithm.
(Short Answer)
4.9/5
(29)
Which of the following is an instruction to the assembler program?
(Multiple Choice)
4.8/5
(41)
Give some examples of abstractions as they relate to a computer system.
(Essay)
4.8/5
(37)
Showing 1 - 20 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)