Deck 1: Introduction to Computers and Java

ملء الشاشة (f)
exit full mode
سؤال
Whereas ________ is centered on creating procedures, ________ is centered on creating objects.

A) procedural programming, object-oriented programming
B) object-oriented programming, procedural programming
C) routine programming, method programming
D) procedural programming, class programming
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An object typically hides it data, but allows outside code to access

A) the pseudocode.
B) the methods that operate on the data.
C) private data members.
D) the data files.
سؤال
Computers can do many different jobs because they are

A) programmable.
B) reliable.
C) automated.
D) electronic.
سؤال
Because Java byte code is the same on all computers, compiled Java programs

A) are non-existent.
B) must be re-compiled for each different machine it is run on.
C) are highly portable.
D) cannot run on computers with different operating systems.
سؤال
Key words are

A) symbols or words that perform operations on one or more operands.
B) words or names defined by the programmer.
C) the data names in your program.
D) words that have a special meaning in the programming language.
سؤال
The original name for Java was

A) *7.
B) Oak.
C) HotJava.
D) Elm.
سؤال
Which of the following is not part of the programming process?

A) design/model
B) debugging/correcting errors
C) testing
D) All the above are parts of the programming process.
سؤال
Software refers to

A) programs.
B) the physical components that a computer is made of.
C) firmware.
D) data stored on the disk drive.
سؤال
A(n) ________ is a software entity that contains data and procedures.

A) object
B) program
C) class
D) method
سؤال
The purpose of validating the results of the program is to

A) determine if the program solves the original problem.
B) correct runtime errors.
C) create a model of the program.
D) correct syntax errors.
سؤال
RAM is usually

A) an input/output device.
B) a volatile type of memory, used only for temporary storage.
C) secondary storage.
D) a static type of memory, used for permanent storage.
سؤال
________ refers to the physical components that a computer is made of.

A) Input
B) Main memory
C) Control unit
D) Hardware
سؤال
Suppose you are at an operating system command line, and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command, you must

A) close all other Windows on your computer system.
B) make sure you are in the same directory or folder where the MyClass.java file is located.
C) execute the java.sun.com program.
D) save the program with the .comp extension.
سؤال
The two primary methods of programming in use today are

A) procedural and object-oriented.
B) hardware and software.
C) practical and theoretical.
D) desktop and mobile.
سؤال
A characteristic of ________ is that only an object's methods are able to directly access and make the changes to the object's data.

A) classes
B) procedures
C) data hiding
D) component reusability
سؤال
One of the design tools used by programmers when creating a model of the program is

A) ALU.
B) pseudocode.
C) byte code.
D) syntax.
سؤال
Byte code instructions are

A) machine code instructions.
B) syntax errors.
C) read and interpreted by the JVM.
D) another name for source code.
سؤال
Which of the following commands will run the compiled Java program named ReadIt?

A) run ReadIt
B) java ReadIt.java
C) java ReadIt
D) go ReadIt
سؤال
Variables are

A) symbolic names made up by the programmer whose values cannot be changed.
B) operators that perform operations on one or more operands.
C) symbolic names made up by the programmer that represents locations in the computer's RAM.
D) reserved words.
سؤال
________ is a cross between human language and a programming language.

A) The compiler
B) Pseudocode
C) The Java Virtual Machine
D) Java
سؤال
Encapsulation refers to the combining of data and code into a single object.
سؤال
Java source files end with the .class extension.
سؤال
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
سؤال
A procedure is a set of programming language statements that, together, perform a specific task.
سؤال
Application software refers to programs that make the computer useful to the user.
سؤال
How many bits are in a byte?

A) 4
B) 8
C) 16
D) 32
سؤال
A solid-state drive has no moving parts and operates faster than a traditional disk drive.
سؤال
What is syntax?

A) Rules that must be followed when writing a program.
B) Words that have a special meaning in the programming language.
C) Symbols or words that perform operations.
D) Words or names defined by the programmer.
سؤال
Colons are used to indicate the end of a Java statement.
سؤال
________ are used to indicate the end of a Java statement.

A) Periods
B) Asterisks
C) Semicolons
D) Colons
سؤال
This is a special language used to write computer programs.

A) Pseudocode
B) Operating system
C) Application
D) Programming language
سؤال
A computer program is

A) a set of instructions that enable the computer to solve a problem or perform a task.
B) main memory.
C) pseudocode.
D) a flow chart.
سؤال
Compiled byte code is also called source code.
سؤال
Logical errors are mistakes that cause the program to produce erroneous results.
سؤال
The data contained in an object is known as

A) methods.
B) attributes.
C) classes.
D) fields.
سؤال
A runtime error is usually the result of

A) a logical error.
B) a syntax error.
C) a compilation error.
D) bad data.
سؤال
Each byte is assigned a unique number known as an address.
سؤال
Application software refers to

A) the programs that make the computer useful to the user.
B) the operating system.
C) key words.
D) pseudocode.
سؤال
This is a set of programming language statements that, together, perform a specific task.

A) pseudocode
B) compiler
C) object
D) procedure
سؤال
Internally, the central processing unit (CPU) consists of two parts:

A) the input and output devices.
B) the control unit and the arithmetic and logic unit (ALU).
C) the control unit and main memory.
D) the arithmetic and login unit (ALU) and main memory.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Computers and Java
1
Whereas ________ is centered on creating procedures, ________ is centered on creating objects.

A) procedural programming, object-oriented programming
B) object-oriented programming, procedural programming
C) routine programming, method programming
D) procedural programming, class programming
A
2
An object typically hides it data, but allows outside code to access

A) the pseudocode.
B) the methods that operate on the data.
C) private data members.
D) the data files.
B
3
Computers can do many different jobs because they are

A) programmable.
B) reliable.
C) automated.
D) electronic.
A
4
Because Java byte code is the same on all computers, compiled Java programs

A) are non-existent.
B) must be re-compiled for each different machine it is run on.
C) are highly portable.
D) cannot run on computers with different operating systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
Key words are

A) symbols or words that perform operations on one or more operands.
B) words or names defined by the programmer.
C) the data names in your program.
D) words that have a special meaning in the programming language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
The original name for Java was

A) *7.
B) Oak.
C) HotJava.
D) Elm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not part of the programming process?

A) design/model
B) debugging/correcting errors
C) testing
D) All the above are parts of the programming process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Software refers to

A) programs.
B) the physical components that a computer is made of.
C) firmware.
D) data stored on the disk drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
A(n) ________ is a software entity that contains data and procedures.

A) object
B) program
C) class
D) method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
The purpose of validating the results of the program is to

A) determine if the program solves the original problem.
B) correct runtime errors.
C) create a model of the program.
D) correct syntax errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
RAM is usually

A) an input/output device.
B) a volatile type of memory, used only for temporary storage.
C) secondary storage.
D) a static type of memory, used for permanent storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ refers to the physical components that a computer is made of.

A) Input
B) Main memory
C) Control unit
D) Hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Suppose you are at an operating system command line, and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command, you must

A) close all other Windows on your computer system.
B) make sure you are in the same directory or folder where the MyClass.java file is located.
C) execute the java.sun.com program.
D) save the program with the .comp extension.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
The two primary methods of programming in use today are

A) procedural and object-oriented.
B) hardware and software.
C) practical and theoretical.
D) desktop and mobile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
A characteristic of ________ is that only an object's methods are able to directly access and make the changes to the object's data.

A) classes
B) procedures
C) data hiding
D) component reusability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
One of the design tools used by programmers when creating a model of the program is

A) ALU.
B) pseudocode.
C) byte code.
D) syntax.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Byte code instructions are

A) machine code instructions.
B) syntax errors.
C) read and interpreted by the JVM.
D) another name for source code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following commands will run the compiled Java program named ReadIt?

A) run ReadIt
B) java ReadIt.java
C) java ReadIt
D) go ReadIt
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
Variables are

A) symbolic names made up by the programmer whose values cannot be changed.
B) operators that perform operations on one or more operands.
C) symbolic names made up by the programmer that represents locations in the computer's RAM.
D) reserved words.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
________ is a cross between human language and a programming language.

A) The compiler
B) Pseudocode
C) The Java Virtual Machine
D) Java
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Encapsulation refers to the combining of data and code into a single object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
Java source files end with the .class extension.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
A procedure is a set of programming language statements that, together, perform a specific task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Application software refers to programs that make the computer useful to the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
How many bits are in a byte?

A) 4
B) 8
C) 16
D) 32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
A solid-state drive has no moving parts and operates faster than a traditional disk drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is syntax?

A) Rules that must be followed when writing a program.
B) Words that have a special meaning in the programming language.
C) Symbols or words that perform operations.
D) Words or names defined by the programmer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Colons are used to indicate the end of a Java statement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ are used to indicate the end of a Java statement.

A) Periods
B) Asterisks
C) Semicolons
D) Colons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
This is a special language used to write computer programs.

A) Pseudocode
B) Operating system
C) Application
D) Programming language
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
A computer program is

A) a set of instructions that enable the computer to solve a problem or perform a task.
B) main memory.
C) pseudocode.
D) a flow chart.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Compiled byte code is also called source code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Logical errors are mistakes that cause the program to produce erroneous results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
The data contained in an object is known as

A) methods.
B) attributes.
C) classes.
D) fields.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
A runtime error is usually the result of

A) a logical error.
B) a syntax error.
C) a compilation error.
D) bad data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Each byte is assigned a unique number known as an address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Application software refers to

A) the programs that make the computer useful to the user.
B) the operating system.
C) key words.
D) pseudocode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
This is a set of programming language statements that, together, perform a specific task.

A) pseudocode
B) compiler
C) object
D) procedure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
Internally, the central processing unit (CPU) consists of two parts:

A) the input and output devices.
B) the control unit and the arithmetic and logic unit (ALU).
C) the control unit and main memory.
D) the arithmetic and login unit (ALU) and main memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.