Deck 1: Introduction to Computers and Java

Full screen (f)
exit full mode
Question
Whereas ________ is centered on creating procedures, ________ is centered on creating objects.

A) procedural programming, object-oriented programming
B) object-oriented programming, procedural programming
C) routine programming, method programming
D) procedural programming, class programming
Use Space or
up arrow
down arrow
to flip the card.
Question
An object typically hides it data, but allows outside code to access

A) the pseudocode.
B) the methods that operate on the data.
C) private data members.
D) the data files.
Question
Computers can do many different jobs because they are

A) programmable.
B) reliable.
C) automated.
D) electronic.
Question
Because Java byte code is the same on all computers, compiled Java programs

A) are non-existent.
B) must be re-compiled for each different machine it is run on.
C) are highly portable.
D) cannot run on computers with different operating systems.
Question
Key words are

A) symbols or words that perform operations on one or more operands.
B) words or names defined by the programmer.
C) the data names in your program.
D) words that have a special meaning in the programming language.
Question
The original name for Java was

A) *7.
B) Oak.
C) HotJava.
D) Elm.
Question
Which of the following is not part of the programming process?

A) design/model
B) debugging/correcting errors
C) testing
D) All the above are parts of the programming process.
Question
Software refers to

A) programs.
B) the physical components that a computer is made of.
C) firmware.
D) data stored on the disk drive.
Question
A(n) ________ is a software entity that contains data and procedures.

A) object
B) program
C) class
D) method
Question
The purpose of validating the results of the program is to

A) determine if the program solves the original problem.
B) correct runtime errors.
C) create a model of the program.
D) correct syntax errors.
Question
RAM is usually

A) an input/output device.
B) a volatile type of memory, used only for temporary storage.
C) secondary storage.
D) a static type of memory, used for permanent storage.
Question
________ refers to the physical components that a computer is made of.

A) Input
B) Main memory
C) Control unit
D) Hardware
Question
Suppose you are at an operating system command line, and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command, you must

A) close all other Windows on your computer system.
B) make sure you are in the same directory or folder where the MyClass.java file is located.
C) execute the java.sun.com program.
D) save the program with the .comp extension.
Question
The two primary methods of programming in use today are

A) procedural and object-oriented.
B) hardware and software.
C) practical and theoretical.
D) desktop and mobile.
Question
A characteristic of ________ is that only an object's methods are able to directly access and make the changes to the object's data.

A) classes
B) procedures
C) data hiding
D) component reusability
Question
One of the design tools used by programmers when creating a model of the program is

A) ALU.
B) pseudocode.
C) byte code.
D) syntax.
Question
Byte code instructions are

A) machine code instructions.
B) syntax errors.
C) read and interpreted by the JVM.
D) another name for source code.
Question
Which of the following commands will run the compiled Java program named ReadIt?

A) run ReadIt
B) java ReadIt.java
C) java ReadIt
D) go ReadIt
Question
Variables are

A) symbolic names made up by the programmer whose values cannot be changed.
B) operators that perform operations on one or more operands.
C) symbolic names made up by the programmer that represents locations in the computer's RAM.
D) reserved words.
Question
________ is a cross between human language and a programming language.

A) The compiler
B) Pseudocode
C) The Java Virtual Machine
D) Java
Question
Encapsulation refers to the combining of data and code into a single object.
Question
Java source files end with the .class extension.
Question
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
Question
A procedure is a set of programming language statements that, together, perform a specific task.
Question
Application software refers to programs that make the computer useful to the user.
Question
How many bits are in a byte?

A) 4
B) 8
C) 16
D) 32
Question
A solid-state drive has no moving parts and operates faster than a traditional disk drive.
Question
What is syntax?

A) Rules that must be followed when writing a program.
B) Words that have a special meaning in the programming language.
C) Symbols or words that perform operations.
D) Words or names defined by the programmer.
Question
Colons are used to indicate the end of a Java statement.
Question
________ are used to indicate the end of a Java statement.

A) Periods
B) Asterisks
C) Semicolons
D) Colons
Question
This is a special language used to write computer programs.

A) Pseudocode
B) Operating system
C) Application
D) Programming language
Question
A computer program is

A) a set of instructions that enable the computer to solve a problem or perform a task.
B) main memory.
C) pseudocode.
D) a flow chart.
Question
Compiled byte code is also called source code.
Question
Logical errors are mistakes that cause the program to produce erroneous results.
Question
The data contained in an object is known as

A) methods.
B) attributes.
C) classes.
D) fields.
Question
A runtime error is usually the result of

A) a logical error.
B) a syntax error.
C) a compilation error.
D) bad data.
Question
Each byte is assigned a unique number known as an address.
Question
Application software refers to

A) the programs that make the computer useful to the user.
B) the operating system.
C) key words.
D) pseudocode.
Question
This is a set of programming language statements that, together, perform a specific task.

A) pseudocode
B) compiler
C) object
D) procedure
Question
Internally, the central processing unit (CPU) consists of two parts:

A) the input and output devices.
B) the control unit and the arithmetic and logic unit (ALU).
C) the control unit and main memory.
D) the arithmetic and login unit (ALU) and main memory.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to Computers and Java
1
Whereas ________ is centered on creating procedures, ________ is centered on creating objects.

A) procedural programming, object-oriented programming
B) object-oriented programming, procedural programming
C) routine programming, method programming
D) procedural programming, class programming
A
2
An object typically hides it data, but allows outside code to access

A) the pseudocode.
B) the methods that operate on the data.
C) private data members.
D) the data files.
B
3
Computers can do many different jobs because they are

A) programmable.
B) reliable.
C) automated.
D) electronic.
A
4
Because Java byte code is the same on all computers, compiled Java programs

A) are non-existent.
B) must be re-compiled for each different machine it is run on.
C) are highly portable.
D) cannot run on computers with different operating systems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Key words are

A) symbols or words that perform operations on one or more operands.
B) words or names defined by the programmer.
C) the data names in your program.
D) words that have a special meaning in the programming language.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
The original name for Java was

A) *7.
B) Oak.
C) HotJava.
D) Elm.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not part of the programming process?

A) design/model
B) debugging/correcting errors
C) testing
D) All the above are parts of the programming process.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Software refers to

A) programs.
B) the physical components that a computer is made of.
C) firmware.
D) data stored on the disk drive.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ________ is a software entity that contains data and procedures.

A) object
B) program
C) class
D) method
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
The purpose of validating the results of the program is to

A) determine if the program solves the original problem.
B) correct runtime errors.
C) create a model of the program.
D) correct syntax errors.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
RAM is usually

A) an input/output device.
B) a volatile type of memory, used only for temporary storage.
C) secondary storage.
D) a static type of memory, used for permanent storage.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
________ refers to the physical components that a computer is made of.

A) Input
B) Main memory
C) Control unit
D) Hardware
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Suppose you are at an operating system command line, and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command, you must

A) close all other Windows on your computer system.
B) make sure you are in the same directory or folder where the MyClass.java file is located.
C) execute the java.sun.com program.
D) save the program with the .comp extension.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
The two primary methods of programming in use today are

A) procedural and object-oriented.
B) hardware and software.
C) practical and theoretical.
D) desktop and mobile.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
A characteristic of ________ is that only an object's methods are able to directly access and make the changes to the object's data.

A) classes
B) procedures
C) data hiding
D) component reusability
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
One of the design tools used by programmers when creating a model of the program is

A) ALU.
B) pseudocode.
C) byte code.
D) syntax.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Byte code instructions are

A) machine code instructions.
B) syntax errors.
C) read and interpreted by the JVM.
D) another name for source code.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following commands will run the compiled Java program named ReadIt?

A) run ReadIt
B) java ReadIt.java
C) java ReadIt
D) go ReadIt
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
Variables are

A) symbolic names made up by the programmer whose values cannot be changed.
B) operators that perform operations on one or more operands.
C) symbolic names made up by the programmer that represents locations in the computer's RAM.
D) reserved words.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
________ is a cross between human language and a programming language.

A) The compiler
B) Pseudocode
C) The Java Virtual Machine
D) Java
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Encapsulation refers to the combining of data and code into a single object.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Java source files end with the .class extension.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
A procedure is a set of programming language statements that, together, perform a specific task.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Application software refers to programs that make the computer useful to the user.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
How many bits are in a byte?

A) 4
B) 8
C) 16
D) 32
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
A solid-state drive has no moving parts and operates faster than a traditional disk drive.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
What is syntax?

A) Rules that must be followed when writing a program.
B) Words that have a special meaning in the programming language.
C) Symbols or words that perform operations.
D) Words or names defined by the programmer.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Colons are used to indicate the end of a Java statement.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
________ are used to indicate the end of a Java statement.

A) Periods
B) Asterisks
C) Semicolons
D) Colons
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
This is a special language used to write computer programs.

A) Pseudocode
B) Operating system
C) Application
D) Programming language
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
A computer program is

A) a set of instructions that enable the computer to solve a problem or perform a task.
B) main memory.
C) pseudocode.
D) a flow chart.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Compiled byte code is also called source code.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Logical errors are mistakes that cause the program to produce erroneous results.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
The data contained in an object is known as

A) methods.
B) attributes.
C) classes.
D) fields.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
A runtime error is usually the result of

A) a logical error.
B) a syntax error.
C) a compilation error.
D) bad data.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Each byte is assigned a unique number known as an address.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Application software refers to

A) the programs that make the computer useful to the user.
B) the operating system.
C) key words.
D) pseudocode.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
This is a set of programming language statements that, together, perform a specific task.

A) pseudocode
B) compiler
C) object
D) procedure
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Internally, the central processing unit (CPU) consists of two parts:

A) the input and output devices.
B) the control unit and the arithmetic and logic unit (ALU).
C) the control unit and main memory.
D) the arithmetic and login unit (ALU) and main memory.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.