Exam 19: broad concept of computer security and its importance in modern society.
Exam 1: The Big Picture52 Questions
Exam 2: Binary Values and Number Systems49 Questions
Exam 3: Data Representation51 Questions
Exam 4: Gates and Circuits49 Questions
Exam 5: Computing Components49 Questions
Exam 6: Low-Level Programming Languages and Pseudocode49 Questions
Exam 7: Problem Solving and Algorithms48 Questions
Exam 8: Abstract Data Types and Subprograms49 Questions
Exam 9: Object-Oriented Design and High-Level Programming Languages47 Questions
Exam 10: Operating Systems49 Questions
Exam 11: File Systems and Directories49 Questions
Exam 12: Information Systems45 Questions
Exam 13: Artificial Intelligence47 Questions
Exam 14: Simulation, Graphics, Gaming, and Other Applications50 Questions
Exam 15: Networks48 Questions
Exam 16: The World Wide Web44 Questions
Exam 17: Computer Security49 Questions
Exam 18: Limitations of Computing50 Questions
Exam 19: broad concept of computer security and its importance in modern society.102 Questions
Select questions type
Explain the concept of embedded systems and give examples from your own home.
(Essay)
4.9/5
(38)
Describe the three aspects of a system that make it well-suited for simulation.
(Essay)
4.8/5
(33)
Why are spreadsheets particularly good at performing what-if analysis?
(Essay)
4.7/5
(40)
Compare and contrast the ASCII character set and the Unicode character set.
(Essay)
4.7/5
(31)
Describe the steps in creating and running an assembly-language program.
(Essay)
4.9/5
(32)
Given non-negative integers A and B, their greatest common divisor is the largest integers that divides both A and B evenly, denoted gcd(A, B). Observe that for any A, gcd(A, 0) = A. Also, if A < B, then gcd(A, B) = gcd(A, B - A). Finally, for any A and B, gcd(A, B) = gcd(B, A). Use these three properties to develop an algorithm to compute greatest common divisors.
(Essay)
4.9/5
(38)
Explain the three primary ways that parallel-processing systems are used for more efficient problem solving.
(Essay)
4.9/5
(43)
How does the process of sampling an audio signal result in a digitized representation of music that can be played back?
(Essay)
4.9/5
(39)
Match the type of security attack to its description.
-Uses a hidden feature of a program to gain special access to a system.
(Multiple Choice)
4.9/5
(36)
Describe, in general, the limitations computers have regarding numbers and arithmetic.
(Essay)
4.8/5
(31)
What problem does the following algorithm solve?
Set count to zero
Set total to zero
Write "How many?"
Read limit
WHILE count < limit
Read num
Set total to total + num
Set count to count + 1
Set ans to total divided by count
Write ans
(Essay)
4.8/5
(46)
Describe the basic characteristics of a von Neumann computer architecture.
(Essay)
4.8/5
(37)
Match the type of security attack to its description.
-Uses a fake web page to collect information such as usernames and passwords.
(Multiple Choice)
4.9/5
(48)
Showing 21 - 40 of 102
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)