Deck 1: Introduction to Computers and Java
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/51
Play
Full screen (f)
Deck 1: Introduction to Computers and Java
1
A program is a sequence of instructions stored in:
A) The CPU
B) The computer's memory
C) Software
D) Firmware
A) The CPU
B) The computer's memory
C) Software
D) Firmware
B
2
The original name for Java was:
A) Java
B) HotJava
C) Elm
D) Oak
A) Java
B) HotJava
C) Elm
D) Oak
D
3
Byte code instructions are:
A) Another name for source code
B) Syntax errors
C) Machine code instructions
D) Read and interpreted by the JVM
A) Another name for source code
B) Syntax errors
C) Machine code instructions
D) Read and interpreted by the JVM
D
4
A runtime error is usually the result of:
A) A logical error
B) A syntax error
C) A compilation error
D) Bad data
A) A logical error
B) A syntax error
C) A compilation error
D) Bad data
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
5
Syntax is:
A) Words that have a special meaning in the programming language
B) Rules that must be followed when writing a program
C) Punctuation
D) Symbols or words that perform operations
A) Words that have a special meaning in the programming language
B) Rules that must be followed when writing a program
C) Punctuation
D) Symbols or words that perform operations
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
6
A byte is a collection of:
A) Four bits
B) Six bits
C) Eight bits
D) A dollar
A) Four bits
B) Six bits
C) Eight bits
D) A dollar
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
7
________ refers to the physical components that a computer is made of.
A) Device
B) System
C) Hardware
D) Software
A) Device
B) System
C) Hardware
D) Software
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
8
The computer can do such a wide variety of tasks because:
A) It can be programmed
B) It is a machine
C) It contains a central processing unit (CPU)
D) It has the ability to connect to the Internet
A) It can be programmed
B) It is a machine
C) It contains a central processing unit (CPU)
D) It has the ability to connect to the Internet
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
9
Another term for programs is:
A) Hardware
B) Software
C) Firmware
D) Shareware
A) Hardware
B) Software
C) Firmware
D) Shareware
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following professions use the computer as a tool?
A) Accountants
B) Engineers
C) Mechanics
D) Nurses
E) All of the above
A) Accountants
B) Engineers
C) Mechanics
D) Nurses
E) All of the above
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
11
One of the design tools used by programmers when creating a model of the program is:
A) Disk drive
B) Compiler
C) ALU
D) Pseudocode
A) Disk drive
B) Compiler
C) ALU
D) Pseudocode
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
12
An operating system can be categorized according to:
A) The number of users they can accommodate
B) The number of tasks they can perform at one time
C) Both of the above
D) neither of the above
A) The number of users they can accommodate
B) The number of tasks they can perform at one time
C) Both of the above
D) neither of the above
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
13
Suppose you are at an operating system command line, and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command, you must:
A) Save the program with the .comp extension
B) Execute the java.sun.com program
C) Make sure you are in the same directory or folder where MyClass.java is located
D) Close all other Windows on your computer system
Before entering the command, you must:
A) Save the program with the .comp extension
B) Execute the java.sun.com program
C) Make sure you are in the same directory or folder where MyClass.java is located
D) Close all other Windows on your computer system
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a secondary storage device?
A) Disk drives
B) Solid state drives
C) USB drives
D) None of the above
E) All of the above
A) Disk drives
B) Solid state drives
C) USB drives
D) None of the above
E) All of the above
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
15
In the programming process which of the following is NOT involved in defining what the program is to do:
A) Process
B) Compile code
C) Input
D) Output
E) Purpose
A) Process
B) Compile code
C) Input
D) Output
E) Purpose
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
16
Computer programming is:
A) An art
B) A science
C) Both of the above
D) neither of the above
A) An art
B) A science
C) Both of the above
D) neither of the above
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
17
Variables are:
A) Symbolic names made up by the programmer that represents locations in the computer's RAM
B) Reserved words
C) Symbolic names made up by the programmer whose values cannot be changed
D) Operators that perform operations on one or more operands
A) Symbolic names made up by the programmer that represents locations in the computer's RAM
B) Reserved words
C) Symbolic names made up by the programmer whose values cannot be changed
D) Operators that perform operations on one or more operands
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
18
The major components of a typical computer system consist of:
A) The CPU
B) Input/output devices
C) Main memory
D) Secondary storage devices
E) All of the above
A) The CPU
B) Input/output devices
C) Main memory
D) Secondary storage devices
E) All of the above
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
19
This is a special language used to write computer programs.
A) Programming language
B) Operating system
C) Application
D) Pseudocode
A) Programming language
B) Operating system
C) Application
D) Pseudocode
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
20
When a computer is running a program, the CPU is engaged in a process formally known as:
A) The decrypt/validate/commit cycle
B) Low-level machine mode
C) The fetch/decode/execute cycle
D) Parallax data execution
A) The decrypt/validate/commit cycle
B) Low-level machine mode
C) The fetch/decode/execute cycle
D) Parallax data execution
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
21
________ results in only the object's methods being able to directly access and make the changes to the object's data.
A) Component reusability
B) Classes
C) Data hiding
D) Procedures
A) Component reusability
B) Classes
C) Data hiding
D) Procedures
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
22
Because Java byte code is the same on all computers, compiled Java programs:
A) Must be re-compiled for each different machine it is run on
B) Cannot run on Linux systems
C) Are non-existent
D) Are highly portable
A) Must be re-compiled for each different machine it is run on
B) Cannot run on Linux systems
C) Are non-existent
D) Are highly portable
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
23
The purpose of validating the results of the program is:
A) To create a model of the program
B) To correct syntax errors
C) To correct runtime errors
D) To determine whether the program solves the original problem
A) To create a model of the program
B) To correct syntax errors
C) To correct runtime errors
D) To determine whether the program solves the original problem
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
24
The data contained in an object is known as:
A) Methods
B) Attributes
C) Classes
D) Atriums
A) Methods
B) Attributes
C) Classes
D) Atriums
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
25
This is a set of programming language statements that, together, perform a specific task.
A) Object
B) Compiler
C) Procedure
D) Pseudocode
A) Object
B) Compiler
C) Procedure
D) Pseudocode
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
26
RAM is usually:
A) A static type of memory, used for permanent storage
B) A volatile type of memory, used only for temporary storage
C) Secondary storage
D) An input/output device
A) A static type of memory, used for permanent storage
B) A volatile type of memory, used only for temporary storage
C) Secondary storage
D) An input/output device
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
27
Java was developed by:
A) Microsoft.
B) IBM
C) Sun Microsystems
D) Hewlett-Packard
A) Microsoft.
B) IBM
C) Sun Microsystems
D) Hewlett-Packard
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
28
Internally, the central processing unit (CPU) consists of two parts:
A) The control unit and the arithmetic and logic unit (ALU)
B) The control unit and main memory
C) The arithmetic and login unit (ALU) and main memory
D) The input and output devices
A) The control unit and the arithmetic and logic unit (ALU)
B) The control unit and main memory
C) The arithmetic and login unit (ALU) and main memory
D) The input and output devices
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is NOT part of the programming process?
A) Design
B) Testing
C) Debugging
D) All the above are parts of the programming process.
A) Design
B) Testing
C) Debugging
D) All the above are parts of the programming process.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
30
Application software refers to:
A) The operating system
B) Pseudocode
C) Key words
D) The programs that make the computer useful to the user
A) The operating system
B) Pseudocode
C) Key words
D) The programs that make the computer useful to the user
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
31
This is a software entity that contains data and procedures.
A) Method
B) Object
C) Class
D) Program
A) Method
B) Object
C) Class
D) Program
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following will run the compiled program ReadIt?
A) java ReadIt.java
B) java ReadIt
C) run ReadIt
D) go ReadIt
A) java ReadIt.java
B) java ReadIt
C) run ReadIt
D) go ReadIt
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
33
The computer is a tool used by so many professions that it cannot be easily categorized.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following will compile a program called ReadIt?
A) java ReadIt.java
B) java ReadIt.javac
C) javac ReadIt.java
D) javac ReadIt.javac
A) java ReadIt.java
B) java ReadIt.javac
C) javac ReadIt.java
D) javac ReadIt.javac
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
35
This is a cross between human language and a programming language.
A) Pseudocode
B) Java
C) The Java Virtual Machine
D) The compiler
A) Pseudocode
B) Java
C) The Java Virtual Machine
D) The compiler
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
36
These are used to indicate the end of a Java statement.
A) Semicolons
B) Colons
C) Periods
D) Asterisks
A) Semicolons
B) Colons
C) Periods
D) Asterisks
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
37
Key words are:
A) The data names in your program
B) Words that have a special meaning in the programming language
C) Symbols or words that perform operations on one or more operands
D) Words or names defined by the programmer
A) The data names in your program
B) Words that have a special meaning in the programming language
C) Symbols or words that perform operations on one or more operands
D) Words or names defined by the programmer
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
38
A computer program is:
A) A set of instructions that enable the computer to solve a problem or perform a task
B) Main memory
C) Pseudocode
D) A flow chart
A) A set of instructions that enable the computer to solve a problem or perform a task
B) Main memory
C) Pseudocode
D) A flow chart
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
39
Each different type of CPU has its own:
A) Syntax
B) Firmware
C) Machine language
D) Software
A) Syntax
B) Firmware
C) Machine language
D) Software
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
40
Software refers to:
A) Secondary storage.
B) Firmware
C) Programs
D) Applets
A) Secondary storage.
B) Firmware
C) Programs
D) Applets
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
41
The contents of a variable cannot be changed while the program is running.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
42
Colons are used to indicate the end of a Java statement.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
43
When an object's internal data is hidden from outside code and access to that data is restricted to the object's methods, the data is protected from accidental corruption.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
44
Each byte is assigned a unique number known as an address.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
45
Logical errors are mistakes that cause the program to produce erroneous results.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
46
Java source files end with the .class extension.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
47
Application software refers to programs that make the computer useful to the user.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
48
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
49
Without programmers, the users of computers would have no software, and without software, computers would not be able to do anything.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
50
Compiled byte code is also called source code.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
51
Encapsulation refers to the combining of data and code into a single object.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck