Deck 3: Data Representation

Full screen (f)
exit full mode
Question
Computers are designed to process character data and can therefore represent characters directly.
Use Space or
up arrow
down arrow
to flip the card.
Question
​Computer input devices convert external data into an internal representation that can be carried to and manipulated by processing circuitry.
Question
The number of digits needed to represent a value decreases as the numbering system's base decreases.
Question
Decimal and binary notations are alternative forms of Boolean logic.
Question
Monetary amounts should be stored and manipulated as binary floating-point numbers.
Question
Generally, a byte is the largest unit of data that can be read from or written to a storage device.
Question
In numbering systems other than the decimal numbering system, the term radix point is used for the period or comma.
Question
Automated data processing combines physics and mathematics.
Question
​You can increase a fixed radix point format's numeric range by allocating more bits to the whole portion.
Question
The representation format for each data type balances compactness, range, accuracy, ease of manipulation, and standardization.
Question
ASCII is a 7-bit format because most computers and peripheral devices transmit data in bytes and because parity checking was used widely in the 1960s to 1980s for detecting transmission errors.
Question
With any fixed-width data storage format, it's possible that the result of a computation will be too large to fit in the format.
Question
Scientific and floating-point notation is far more complex than integer data formats.
Question
To avoid overflow and increase accuracy, some computers and programming languages define additional numeric data types called long-precision data formats.
Question
In ASCII, NAK is sent to acknowledge correct receipt of data, and ERR is sent to indicate that an error has been detected.
Question
The number of bits in a floating-point string and the formats of the mantissa and exponent impose limits on the range of values that can be represented.
Question
Double-precision integers are sometimes called large integers.
Question
In the binary32 format, the leading sign bit applies to the exponent, not the mantissa.
Question
Unicode is widely supported in modern software, including most OSs and word-processing applications.
Question
Twos complement notation is simple to understand for most people.
Question
Using contiguous storage locations, especially in secondary storage devices, simplifies the allocation of storage locations.
Question
​Each element of a doubly linked list has two pointers: one pointing to the next element in the list and one pointing to the top element in the list.
Question
More storage locations are required for a linked list than for an array with equivalent content because both data and pointers must be stored.
Question
The rightmost digit in a bit string is the ____.

A) least significant digit
B) most significant digit
C) least valuable digit
D) most valuable digit
Question
​Linked lists are easier to expand or shrink than arrays are.
Question
The leftmost digit in a bit string is called the ____.

A) least significant digit
B) most significant digit
C) least valuable digit
D) most valuable digit
Question
Whether implemented in system or application software, almost all data structures make extensive use of pointers and addresses.
Question
Large numeric values expressed in octal notation are one-third the length of corresponding ____ notation.

A) decimal
B) ternary
C) binary
D) hexadecimal
Question
​The advantage of using an index lies in the efficiency of record insertion, deletion, and retrieval.
Question
The term "____" describes the number of bits used to represent a numeric value.

A) compactness
B) completeness
C) value
D) efficiency
Question
Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.

A) Newton
B) ​Boolean
C) Turing
D) standard
Question
In the decimal or binary notations, the symbol used to represent a digit and the digit's position in a string determines its ____.

A) sign
B) placement
C) base
D) value
Question
Before Unicode, devices designed for character I/O used ASCII by default and vendor-specific methods or older ISO standards to process character sets other than Latin-1.
Question
In a sequential file, records are stored in contiguous storage locations.
Question
The multiplier that describes the difference between one position and the next is the ____ of the numbering system.

A) Base
B) Mantissa
C) power
D) exponent
Question
In the decimal numbering system, the period or comma is called a ____.

A) place holder
B) division point
C) marker point
D) decimal point
Question
Hexadecimal numbering uses ____ as its base or radix.

A) 2
B) 8
C) 10
D) 16
Question
​In a ____, each digit can have only one of two possible values: 0 or 1.

A) decimal number​
B) ​hexadecimal number
C) ​binary number
D) ​unary number
Question
​The complexity of data structures is limited only by the software.
Question
Intel microprocessors have been used in PCs since 1961.
Question
When discussing computer processing, ____ refers to executing processor instructions, such as addition, subtraction, and equality comparisons, and "ease" refers to machine efficiency.

A) abstraction
B) manipulation
C) interpolation
D) inference
Question
The upper 128 entries in Latin-1 are sometimes called ____.

A) multibyte characters
B) international characters
C) Western characters
D) multinational characters
Question
A(n) ____ is a whole number-a value that doesn't have a fractional part.

A) real number
B) imaginary number
C) floating point number
D) integer
Question
The accuracy, or precision, of data format representation increases with ____.

A) the size of the data word
B) the sign of the data format
C) the number of data bits used
D) the position of the radix
Question
A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.

A) primitive
B) object
C) pointer
D) data structure
Question
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.

A) Rounding
B) Rotation
C) Overflow
D) Underflow
Question
​____ is a character-coding method developed by IBM in the 1960s and used in all IBM mainframes well into the 2000s.

A) ANSI
B) UNICODE
C) EBCDIC
D) ASCII
Question
____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.

A) Underflow
B) Rounding
C) Approximation
D) Overflow
Question
The assignment of numeric codes to characters follows a specific order called a(n) ____.

A) alignment sequence
B) collating sequence
C) alphabet sequence
D) byte sequence
Question
In ____ notation, nonnegative integer values are represented as ordinary binary values.

A) twos complement
B) ones complement
C) excess
D) packed
Question
The ____ data type has only two data values-true and false.

A) Boolean
B) integer
C) floating point
D) character
Question
Numbers such as 1/3 are stored in floating-point format by ____.

A) approximation
B) truncation
C) packing
D) rounding
Question
A(n) ____ can contain both whole and fractional components.

A) integer
B) imaginary number
C) real number
D) binary number
Question
The data types a CPU supports are sometimes called ____ data types.

A) user
B) complex
C) primitive
D) limited
Question
The fractional portion of a real number is represented by digits to the right of the ____.

A) radix point
B) mantissa
C) exponent
D) base
Question
In their written form, English and many other languages use alphabetic letters, numerals, punctuation marks, and a variety of other special-purpose symbols known as ____.

A) characters
B) bytes
C) strings
D) integers
Question
A ____ data format combines two adjacent fixed-length data items to hold a single value.

A) single-precision
B) standard-precision
C) scientific
D) double-precision
Question
Real numbers are represented in computers by using ____.

A) integer notation
B) floating-point notation
C) packed values notation
D) complementary notation
Question
____ notation always uses a fixed number of bits, with the leftmost bit representing the sign.

A) Ones complement
B) Excess
C) Twos complement
D) Packed
Question
Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.

A) signed integer
B) signed real
C) unsigned integer
D) unsigned real
Question
A processor's efficiency depends on its ____________________.
Question
The address of an array element can be calculated with the starting address of the array and the element's ____.

A) base
B) index
C) size
D) name
Question
A sequence of records on secondary storage is called a ____.

A) file
B) record
C) database
D) sleeve
Question
In computer terminology, each digit of a binary number is called a(n) ____________________.
Question
The programs in a class are called ____.

A) properties
B) attributes
C) methods
D) children
Question
____________________ numbers often designate memory addresses.
Question
A(n) ____ is an ordered list in which each element can be referenced by an index to its position.

A) list
B) matrix
C) vector
D) array
Question
A(n) ____ is a data structure containing both traditional (static) data elements and programs that manipulate the data.

A) Array
B) Stack
C) object
D) class
Question
​A(n) ____ is a data element containing the address of another data element.

A) pointer
B) data structure
C) object
D) list
Question
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Question
A sequence of records stored in main memory is normally called a ____.

A) table
B) table
C) Database
D) Class
Question
​The physical laws of electricity, optics, and quantum mechanics are described by ____________________.
Question
A group of bits that describe a single data value is called a(n) ____________________.
Question
A(n) ____ is one instance, or variable, of a class.

A) structure
B) object
C) list
D) implementation
Question
Compilers and interpreters for high-level programming languages, such as C and Java, convert decimal numbers into ____________________ numbers automatically when generating CPU instructions and data values.
Question
A string of eight bits is called a(n) ____________________.
Question
A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.

A) array
B) queue
C) linked list
D) stack
Question
A(n) ____ is a set of related data values.

A) pointer
B) list
C) array
D) record
Question
​Computer systems represent data electrically and process it with ____________________
Question
____________________ notation uses the base-8 numbering system and has a range of digits from 0 to 7.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Data Representation
1
Computers are designed to process character data and can therefore represent characters directly.
False
2
​Computer input devices convert external data into an internal representation that can be carried to and manipulated by processing circuitry.
True
3
The number of digits needed to represent a value decreases as the numbering system's base decreases.
False
4
Decimal and binary notations are alternative forms of Boolean logic.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Monetary amounts should be stored and manipulated as binary floating-point numbers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Generally, a byte is the largest unit of data that can be read from or written to a storage device.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
In numbering systems other than the decimal numbering system, the term radix point is used for the period or comma.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Automated data processing combines physics and mathematics.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
​You can increase a fixed radix point format's numeric range by allocating more bits to the whole portion.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
The representation format for each data type balances compactness, range, accuracy, ease of manipulation, and standardization.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
ASCII is a 7-bit format because most computers and peripheral devices transmit data in bytes and because parity checking was used widely in the 1960s to 1980s for detecting transmission errors.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
With any fixed-width data storage format, it's possible that the result of a computation will be too large to fit in the format.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Scientific and floating-point notation is far more complex than integer data formats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
To avoid overflow and increase accuracy, some computers and programming languages define additional numeric data types called long-precision data formats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
In ASCII, NAK is sent to acknowledge correct receipt of data, and ERR is sent to indicate that an error has been detected.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
The number of bits in a floating-point string and the formats of the mantissa and exponent impose limits on the range of values that can be represented.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
Double-precision integers are sometimes called large integers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
In the binary32 format, the leading sign bit applies to the exponent, not the mantissa.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Unicode is widely supported in modern software, including most OSs and word-processing applications.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Twos complement notation is simple to understand for most people.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Using contiguous storage locations, especially in secondary storage devices, simplifies the allocation of storage locations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
​Each element of a doubly linked list has two pointers: one pointing to the next element in the list and one pointing to the top element in the list.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
More storage locations are required for a linked list than for an array with equivalent content because both data and pointers must be stored.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
The rightmost digit in a bit string is the ____.

A) least significant digit
B) most significant digit
C) least valuable digit
D) most valuable digit
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
​Linked lists are easier to expand or shrink than arrays are.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
The leftmost digit in a bit string is called the ____.

A) least significant digit
B) most significant digit
C) least valuable digit
D) most valuable digit
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
Whether implemented in system or application software, almost all data structures make extensive use of pointers and addresses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Large numeric values expressed in octal notation are one-third the length of corresponding ____ notation.

A) decimal
B) ternary
C) binary
D) hexadecimal
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
​The advantage of using an index lies in the efficiency of record insertion, deletion, and retrieval.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
The term "____" describes the number of bits used to represent a numeric value.

A) compactness
B) completeness
C) value
D) efficiency
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Binary numbers are well suited to computer processing because they correspond directly with values in ____ logic.

A) Newton
B) ​Boolean
C) Turing
D) standard
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
In the decimal or binary notations, the symbol used to represent a digit and the digit's position in a string determines its ____.

A) sign
B) placement
C) base
D) value
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Before Unicode, devices designed for character I/O used ASCII by default and vendor-specific methods or older ISO standards to process character sets other than Latin-1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
In a sequential file, records are stored in contiguous storage locations.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
The multiplier that describes the difference between one position and the next is the ____ of the numbering system.

A) Base
B) Mantissa
C) power
D) exponent
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
In the decimal numbering system, the period or comma is called a ____.

A) place holder
B) division point
C) marker point
D) decimal point
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Hexadecimal numbering uses ____ as its base or radix.

A) 2
B) 8
C) 10
D) 16
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
​In a ____, each digit can have only one of two possible values: 0 or 1.

A) decimal number​
B) ​hexadecimal number
C) ​binary number
D) ​unary number
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
​The complexity of data structures is limited only by the software.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Intel microprocessors have been used in PCs since 1961.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
When discussing computer processing, ____ refers to executing processor instructions, such as addition, subtraction, and equality comparisons, and "ease" refers to machine efficiency.

A) abstraction
B) manipulation
C) interpolation
D) inference
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
The upper 128 entries in Latin-1 are sometimes called ____.

A) multibyte characters
B) international characters
C) Western characters
D) multinational characters
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) ____ is a whole number-a value that doesn't have a fractional part.

A) real number
B) imaginary number
C) floating point number
D) integer
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
The accuracy, or precision, of data format representation increases with ____.

A) the size of the data word
B) the sign of the data format
C) the number of data bits used
D) the position of the radix
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ____ is a related group of primitive data elements organized for some type of common processing and is defined and manipulated in software.

A) primitive
B) object
C) pointer
D) data structure
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated to store it.

A) Rounding
B) Rotation
C) Overflow
D) Underflow
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
​____ is a character-coding method developed by IBM in the 1960s and used in all IBM mainframes well into the 2000s.

A) ANSI
B) UNICODE
C) EBCDIC
D) ASCII
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
____ occurs when the absolute value of a computational result contains too many bits to fit into a fixed-width data format.

A) Underflow
B) Rounding
C) Approximation
D) Overflow
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
The assignment of numeric codes to characters follows a specific order called a(n) ____.

A) alignment sequence
B) collating sequence
C) alphabet sequence
D) byte sequence
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
In ____ notation, nonnegative integer values are represented as ordinary binary values.

A) twos complement
B) ones complement
C) excess
D) packed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
The ____ data type has only two data values-true and false.

A) Boolean
B) integer
C) floating point
D) character
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Numbers such as 1/3 are stored in floating-point format by ____.

A) approximation
B) truncation
C) packing
D) rounding
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) ____ can contain both whole and fractional components.

A) integer
B) imaginary number
C) real number
D) binary number
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
The data types a CPU supports are sometimes called ____ data types.

A) user
B) complex
C) primitive
D) limited
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
The fractional portion of a real number is represented by digits to the right of the ____.

A) radix point
B) mantissa
C) exponent
D) base
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
In their written form, English and many other languages use alphabetic letters, numerals, punctuation marks, and a variety of other special-purpose symbols known as ____.

A) characters
B) bytes
C) strings
D) integers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
A ____ data format combines two adjacent fixed-length data items to hold a single value.

A) single-precision
B) standard-precision
C) scientific
D) double-precision
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Real numbers are represented in computers by using ____.

A) integer notation
B) floating-point notation
C) packed values notation
D) complementary notation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
____ notation always uses a fixed number of bits, with the leftmost bit representing the sign.

A) Ones complement
B) Excess
C) Twos complement
D) Packed
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Most CPUs provide a(n) ____ data type, which stores positive integer values as ordinary binary numbers.

A) signed integer
B) signed real
C) unsigned integer
D) unsigned real
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A processor's efficiency depends on its ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
The address of an array element can be calculated with the starting address of the array and the element's ____.

A) base
B) index
C) size
D) name
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
A sequence of records on secondary storage is called a ____.

A) file
B) record
C) database
D) sleeve
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
In computer terminology, each digit of a binary number is called a(n) ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
The programs in a class are called ____.

A) properties
B) attributes
C) methods
D) children
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ numbers often designate memory addresses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ____ is an ordered list in which each element can be referenced by an index to its position.

A) list
B) matrix
C) vector
D) array
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
A(n) ____ is a data structure containing both traditional (static) data elements and programs that manipulate the data.

A) Array
B) Stack
C) object
D) class
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
​A(n) ____ is a data element containing the address of another data element.

A) pointer
B) data structure
C) object
D) list
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
A sequence of records stored in main memory is normally called a ____.

A) table
B) table
C) Database
D) Class
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
​The physical laws of electricity, optics, and quantum mechanics are described by ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
A group of bits that describe a single data value is called a(n) ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ____ is one instance, or variable, of a class.

A) structure
B) object
C) list
D) implementation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Compilers and interpreters for high-level programming languages, such as C and Java, convert decimal numbers into ____________________ numbers automatically when generating CPU instructions and data values.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
A string of eight bits is called a(n) ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.

A) array
B) queue
C) linked list
D) stack
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ____ is a set of related data values.

A) pointer
B) list
C) array
D) record
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
​Computer systems represent data electrically and process it with ____________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ notation uses the base-8 numbering system and has a range of digits from 0 to 7.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.