Exam 6: An Introduction to System Software and Virtual Machines
Exam 1: An Introduction to Computer Science50 Questions
Exam 2: Algorithm Discovery and Design50 Questions
Exam 3: The Efficiency of Algorithms50 Questions
Exam 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates50 Questions
Exam 5: Computer Systems Organization50 Questions
Exam 6: An Introduction to System Software and Virtual Machines50 Questions
Exam 7: Computer Networks and Cloud Computing50 Questions
Exam 8: Information Security50 Questions
Exam 9: Introduction to High-Level Language Programming50 Questions
Exam 10: The Tower of Babel50 Questions
Exam 11: Compilers and Language Translation50 Questions
Exam 12: Models of Computation49 Questions
Exam 13: Simulation and Modeling50 Questions
Exam 14: Electronic Commerce, Databases, and Personal Privacy50 Questions
Exam 15: Artificial Intelligence50 Questions
Exam 16: Computer Graphics and Entertainment: Movies, Games, and Virtual Communities50 Questions
Exam 17: Making Decisions About Computers, Information, and Society50 Questions
Select questions type
The variable used to determine the address of a given instruction or piece of data is called the program counter._________________________
(True/False)
4.9/5
(38)
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.
(Multiple Choice)
4.9/5
(32)
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.
(Multiple Choice)
5.0/5
(29)
A single high-level language instruction is typically translated into many high-level language instructions._________________________
(True/False)
4.8/5
(35)
One of the problems with machine language is that it uses binary.
(True/False)
4.8/5
(40)
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
(Short Answer)
4.9/5
(45)
Assemblers, compilers, and interpreters are all examples of ____________________ services.
(Short Answer)
4.7/5
(34)
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.
(Multiple Choice)
4.9/5
(32)
A program written in assembly language is called the ____ program.
(Multiple Choice)
4.8/5
(34)
Briefly explain the function of the operating system as a security guard.
(Essay)
4.9/5
(37)
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.
(Multiple Choice)
4.9/5
(34)
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
(Multiple Choice)
4.9/5
(37)
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented._________________________
(True/False)
4.9/5
(36)
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.
(Multiple Choice)
4.8/5
(38)
Typically, all requests to a(n) ____________________ operating system are prioritized.
(Short Answer)
5.0/5
(41)
The ____ hides from the user the messy details of underlying hardware.
(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)