Exam 6: An Introduction to System Software and Virtual Machines
Exam 1: An Introduction to Computer Science50 Questions
Exam 2: Algorithm Discovery and Design50 Questions
Exam 3: The Efficiency of Algorithms50 Questions
Exam 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates50 Questions
Exam 5: Computer Systems Organization50 Questions
Exam 6: An Introduction to System Software and Virtual Machines50 Questions
Exam 7: Computer Networks, The Internet, and the World Wide Web50 Questions
Exam 8: Information Security50 Questions
Exam 9: Introduction to High-Level Language Programming50 Questions
Exam 10: The Tower of Babel50 Questions
Exam 11: Compilers and Language Translation50 Questions
Exam 12: Models of Computation49 Questions
Exam 13: Simulation and Modeling50 Questions
Exam 14: Electronic Commerce and Databases50 Questions
Exam 15: Artificial Intelligence50 Questions
Exam 16: Computer Graphics and Entertainment: Movies, Games, and Virtual Communities50 Questions
Exam 17: Making Decisions About Computers, Information, and Society50 Questions
Select questions type
The ____ hides from the user the messy details of underlying hardware.
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
A
One of the services provided by pseudo-ops is program construction.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
D
The variable used to determine the address of a given instruction or piece of data is called the program counter. _________________________
(True/False)
4.9/5
(31)
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented. _________________________
(True/False)
4.9/5
(23)
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.
(Multiple Choice)
4.9/5
(33)
Briefly explain the function of the operating system as a security guard.
(Essay)
4.8/5
(40)
Typically, all requests to a(n) ____________________ operating system are prioritized.
(Short Answer)
4.9/5
(41)
For a program to run on a naked machine, it must be represented in decimal. _________________________
(True/False)
4.7/5
(39)
____________________ labels increase the maintainability of a program.
(Short Answer)
4.9/5
(29)
An interface prevents accidental damage to hardware, programs, and data.
(True/False)
4.8/5
(35)
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
(Essay)
4.8/5
(29)
____, such as text editors, are sometimes organized into collections called program libraries.
(Multiple Choice)
4.9/5
(39)
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.
(Multiple Choice)
4.9/5
(35)
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
(True/False)
4.7/5
(43)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)