Exam 19: broad concept of computer security and its importance in modern society.

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Explain the concept of embedded systems and give examples from your own home.

(Essay)
4.9/5
(38)

Describe the three aspects of a system that make it well-suited for simulation.

(Essay)
4.8/5
(33)

How does an RGB value represent a color?

(Essay)
4.8/5
(46)

Why are spreadsheets particularly good at performing what-if analysis?

(Essay)
4.7/5
(40)

Describe the floating-point representation of a number.

(Essay)
4.9/5
(46)

Compare and contrast the ASCII character set and the Unicode character set.

(Essay)
4.7/5
(31)

Describe the steps in creating and running an assembly-language program.

(Essay)
4.9/5
(32)

Given non-negative integers A and B, their greatest common divisor is the largest integers that divides both A and B evenly, denoted gcd(A, B). Observe that for any A, gcd(A, 0) = A. Also, if A < B, then gcd(A, B) = gcd(A, B - A). Finally, for any A and B, gcd(A, B) = gcd(B, A). Use these three properties to develop an algorithm to compute greatest common divisors.

(Essay)
4.9/5
(38)

Explain the three primary ways that parallel-processing systems are used for more efficient problem solving.

(Essay)
4.9/5
(43)

Compare and contrast a stack and a queue from a logical view.

(Essay)
4.7/5
(32)

How does the process of sampling an audio signal result in a digitized representation of music that can be played back?

(Essay)
4.9/5
(39)

Match the type of security attack to its description. -Uses a hidden feature of a program to gain special access to a system.

(Multiple Choice)
4.9/5
(36)

What is the relationship among database tables, records, and fields?

(Essay)
4.9/5
(40)

Name some specific uses of cookies.

(Essay)
4.8/5
(39)

Describe, in general, the limitations computers have regarding numbers and arithmetic.

(Essay)
4.8/5
(31)

Convert the following decimal number to base 13: 297

(Short Answer)
4.8/5
(27)

What problem does the following algorithm solve? Set count to zero Set total to zero Write "How many?" Read limit WHILE count < limit Read num Set total to total + num Set count to count + 1 Set ans to total divided by count Write ans

(Essay)
4.8/5
(46)

Describe the basic characteristics of a von Neumann computer architecture.

(Essay)
4.8/5
(37)

Match the type of security attack to its description. -Uses a fake web page to collect information such as usernames and passwords.

(Multiple Choice)
4.9/5
(48)

Compare and contrast multiprogramming and timesharing.

(Essay)
4.8/5
(40)
Showing 21 - 40 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)