Exam 12: Computer Programming
Exam 1: Computers and Digital Basics147 Questions
Exam 2: Computer Hardware150 Questions
Exam 3: Software149 Questions
Exam 4: Operating Systems and File Management150 Questions
Exam 5: Local Area Networks150 Questions
Exam 6: The Internet149 Questions
Exam 7: The Web and E-mail150 Questions
Exam 8: Digital Media150 Questions
Exam 9: The Computer Industry: History,Careers,and Ethics150 Questions
Exam 10: Information Systems Analysis and Design150 Questions
Exam 11: Databases150 Questions
Exam 12: Computer Programming150 Questions
Select questions type
Software specially designed for entering code for computer programs is a(n)____.
(Multiple Choice)
4.8/5
(32)
In the threat model STRIDE,the E stands for ____ or modifying user rights to gain access to data.
(Multiple Choice)
4.8/5
(38)
In the threat model STRIDE,the I stands for ____ or gaining unauthorized access.
(Multiple Choice)
4.9/5
(37)
A(n)____ attribute is available for use by any routine in the program.
(Multiple Choice)
4.9/5
(36)
A(n)____________________ is any class that inherits attributes from a superclass.
(Short Answer)
4.9/5
(34)
Algorithms are usually written in a format specific to the language to be used.
(True/False)
4.9/5
(35)
In Prolog,finding a value for a variable is referred to as ____________________.
(Short Answer)
4.9/5
(46)
In gaming programming,explosions,flares,and fairy dust are accomplished by a(n)____.
(Multiple Choice)
4.9/5
(38)
Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can’t answer. You agree to help answer the questions.
-Bert heard some people discussing classes.He wanted to know if he could go,and you told him in object-oriented terminology a class is ____.
(Multiple Choice)
4.9/5
(29)
In Prolog,a(n)____________________ represents one of the main subjects that a fact describes.
(Short Answer)
4.9/5
(42)
A ____ error occurs when an instruction does not follow the grammar of the programming language.
(Multiple Choice)
4.8/5
(33)
Object-oriented languages that are popular today include all of the following EXCEPT ____.
(Multiple Choice)
4.9/5
(34)
____ attributes define the characteristics of a set of objects.
(Multiple Choice)
4.9/5
(29)
A sequence greeting changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.
(True/False)
4.9/5
(37)
A ____ control structure changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.
(Multiple Choice)
4.7/5
(39)
A(n)____ paradigm is based on the idea that the solution for a program can be visualized in terms of objects that interact with each other.
(Multiple Choice)
4.9/5
(37)
In addition to buffer overflows,hackers can use ____ to find vulnerabilities.
(Multiple Choice)
4.8/5
(34)
A ____ control structure tells a computer what to do based on whether a condition is true or false.
(Multiple Choice)
4.8/5
(35)
Showing 121 - 140 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)