Show Recommended textbook solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Starting Out with Python4th EditionTony Gaddis 629 solutions Which of the following data types is mutable? if x = [4, 7, 9, 2], what is x[2]? 4 7 9 2 if x = 5.0 and y = 3, what is the data type of x * y? integer float string list if python 3.4, if x = 13 and y = 2, what is x/y? 6.5 6 6.0 7 if python 2.7, if x = 13 and y = 2, what is x/y? 6 6.0 6.5 7 The "question-asking" operations of an algorithm are called? control statements conditional statements iterative statements sequential statements Indicate the data type of
the expression for Python 3.X: Computer science is the study of? computers how to write computer programs the uses and applications of computers and software algorithms In computer science terminology, the machine, robot, person, or thing carrying out the steps of an algorithm is called a __? Which of the following is NOT part of the formal definition of an algorithm? it produces a result it halts in a finite amount of time it consists of unambiguous operations it consists of step-by-step instructions it consists of step-by-step instructions Which of the following statements is CORRECT regarding Leibnitz's Wheel and the Pascaline? They were programmable They are examples of early computers They had memory where information could be stored They were mechanical calculators They were mechanical calculators The person who popularized the term "debugging" was: Turing Hopper Babbage Hollerith The while statement is an example of __? a conditional statement an iterative statement a control statement an infinite loop Which of the following statements describes the primitives of a computing agent? They are variables that can only store numerical values. They are written in pseudocode and form a basic outline of an algorithm. They are instructions that the computing agent understands and can execute without further explanation or simplification. They evaluate "true/false conditions" to determine if a loop body should be executed. They are instructions that the computing agent understands and can execute without further explanation or simplification. Given the following python code, answer the following: >>>x = "3.0" What is type(x)? int float string list for the function def myFunction(a,b): return 2 * b + a what is myFunction(3, 10)? 3 10 16 23 Indicate the data type of the expression: >>>3 + 5.0 Boolean Integer Float String Indicate the data type of the expression for Python 3.X: >>>5/2 Boolean Integer Float String Indicate the data type of the expression for Python 3.X: >>>round(2.6) Indicate the data type of the expression for Python 3.X: >>>5/2 == 5/2.0 Boolean Integer Float String Given the following program in python, what will be the value returned? N = 3 counter = 0 while (N > 0): counter = counter * N N = N - 1 return counter 0 321 6
Nothing, because the program will be caught up in an infinite loop What will be the value returned from this script? N = 4 counter = 1 while (N > 0): counter = counter * N N = N - 1 return counter Given the following script in python, What will be value of N when the program terminates? N = 4
counter = 1 while (N > 0): counter = counter * N N = N - 1 return counter Given the following script in python, what will be printed? N = 0 if (N > 0): print("you entered a positive number") else: print("you are not feeling very positive") if (N == 0): print("you entered zero") ________________________________ you entered zero __ you are not feeling very positive __ you entered a positive number you entered zero __ you are not feeling very positive you entered zero you are not feeling very positive you entered zero The list of numbers [6, 2, 3, 1, 5, 4] is to be sorted using BUBBLE SORT. The algorithm for this process involves
nested "for" loops. Which of the following lists is an intermediate result after the first pass over the outer loop has been completed? [2, 6, 3, 1, 5, 4] [1, 2, 3, 6, 5, 4] [1, 2, 3, 4, 5, 6] [2, 3, 1, 5, 4, 6] A program in python prompts the user for input from the keyboard and will store the value as the variable myAnswer. The user types the value 3.0. At this point, the data type for myAnswer is: int float string list what is the final value of y when the following statements are entered in python? >>>x = 3 >>>y = x + 1 >>>x = 7 3 4 7 8 Which of the following has the most optimal worst-case run-time complexity (in terms of the lowest order)? In other words, which of the following sorting algorithms is the most efficient (in the worst case)? bubble sort insertion sort selection sort they all have the same run-time complexity they all have the same run-time complexity What is the run-time complexity of the following program? Convert (10011)2 to base 10 16 17 18 19 Convert (10011)2 to base 8 (22)8 (23)8 (24)8 (25)8 Convert (10011)2 to base 16 (13)16 (14)16 (15)16 (16)16 Find the sum (110)2 + (111)2. Write your answer in hexadecimal. All answers below should be interpreted properly A B C D Convert 52 to binary. (110110)2 (110111)2 (110100)2 (110111)2 The amplitude of a wave is a measure of its tone pitch loudness frequency A(n) ____ is a collection of useful algorithms. primitive binary set library Library Which of the following best characterizes the statements: The value of the 4 bit binary string 1110 in two's complement is: -6 -2 3 13 The value of the binary string 1011 in sign/magnitude is: -5 -3 3 11 For the following sequence in python: For the function defined: def myFun(value): myList = [ ] for i in range(0,2*value): myList.append(i) return myList what is the largest number in the list returned for myFun(5)? 0 5 9 10 Find the bitwise OR for
the following 8-bit strings. Your answer must be an 8-bit string without spaces. Find the bitwise AND for the following 8-bit strings. Your answer must be an 8-bit string without spaces. Find the bitwise XOR for the following 8-bit strings. Your answer must be an 8-bit string without spaces. The True Color RGB encoding scheme uses ___ bits for each color. 1 2 8 24 Which of the following best characterizes the statements: A. DRAM is an example of non-volatile memory Which of the following is NOT a criteria for a binary computer? - The device has two stable energy states - It is possible to switch the state from a 0 to a 1 (or vice versa) by applyling a sufficient amount of energy. - It is possible to sense which state the device is in without permanently destroying the stored value. - It does not have any moving parts It does not have any moving parts Which of the following best characterizes the following two statements: A) ASCII can encode more characters than Unicode B) We can encode more numbers using a Base 10 representation than with a Base 2 representation. What is wrong with the following algorithm? 1. Set X to be 1 2. Increment X 3. Print X 4. If X > 0, repeat from 2 It does not produce a result. It is ambiguous. It does not halt in a finite amount of time. It is not well-ordered. It does not halt in a finite amount of time. Most computer scientists use ____ to design and represent algorithms. natural languages high-level programming languages low-level programming languages pseudocode Pseudocode Correct! Pseudocode allows us to create precise, unambiguous algorithms without worrying about implementation details,. You can read more about pseudocode on page 42 of the textbook. Together, conditional and iterative operations are called ____ operations. sequential control hierarchical dynamic ControlCorrect! Page 46 goes into more detail about control operations. Which of the following is the OAM command for getting keyboard input? READ 0 GET 0 LOAD 0 LDA 0 Which of the following is the OAM command for printing to the screen? PRINT 0 OUT 0 STA 0 PUT 0 Which of the following OAM programs will store the value 25 in memory slot 10? SET 5 MLT 5 STA 10 HLT ________ SET 5 STA 10 MLT 10 STA 10 HLT Which of the following OAMPL commands will produce the value 25? (15 + 10) ___ ( / 100 4) How many bits are required to encode the OAM operation codes? 1 4 Which of the following is an example of a high-level programming language? English Python OAM Machine Language Which of the following is TRUE about machine language? it is readable instructions are given abbreviated names memory addresses must be numeric mathematical symbols are allowed memory
addresses must be numeric What is the result of the following OAMPL program? What is the result of the following OAM program? what is the result of
the following OAMPL line of code? what will the following OAM code do? it will print the value 1 to the screen Assembly language is also referred to as a first generation language second generation language binary language high-level programming language second generation language Which of the following tasks does an assembler NOT perform? convert symbolic op codes to binary convert symbolic addresses to binary translate a program into machine language read instructions from an object file and store them into memory for execution read instructions from an object file and store them into memory for execution What will the following OAM
program print to the output window? What will the following OAM program print to the output window? set 1 brp skip sta 0 hlt skip, set 5 sta 0 hlt Which of the following layers deals with rules for implementing the end-user services provided by a network? Network layer Application layer Transport layer Data link layer Embedded computers can be found: in a cell phone in a credit card in a microwave all of the above Which of the following layers deals with error handling and framing? Network layer Application layer Transport layer Data link layer Which of the following is a low power wireless standard used to communicate between devices located close to each other? Wi-Fi WAN LAN Bluetooth Which of the following best characterizes the statements: Which of the following best characterizes the statements: A keystroke logger is an example of a: virus worm trojan horse denial of service The science of secret writing is: cryptology cryptography cipherography encryption Which of the following terms does not belong with the others? shift cipher substitution cipher stream cipher block cipher The encryption algorithm that TLS/SSL uses is: DES encryption RSA encryption neither DES or RSA encryption both DES and RSA encryption both DES and RSA encryption Which of the following best describes the statements: The practice of impersonating a legitimate site for the purposes of stealing money or stealing identity by collecting confidential information such as credit card numbers, names, and addresses is called: Spooling Spoofing Spamming Scamming When a system contains _____, it means that there are parts of the system that display random behavior. A ____ is one of the most popular and widely-used techniques for building computer models discrete event simulation Which of the following is NOT a reason to construct a simulation model? Which of the following is NOT
an example of a test used to determine if a sequence can be considered to be statistically random? A model that uses a random number generator to introduce some variability into the data is considered to be: Which of the following best
characterizes the two statements: Which of the following statements is TRUE? - Scientists think it is necessary to write a Turing machine when they talk about an algorithmic computation. - A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task. - A Turing machine that is executing an algorithm to solve some task need not halt when begun on a tape containing input appropriate to that task. - Simply running the Turing machine enables us to make a decision about halting. A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task. A Turing machine always contains a special symbol for: 0 1 blank x Characterize the following statements: Which of the following refers to the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose? Cybersquatting DNS squatting URL squatting Website squatting Web personalization is possible using: Which of the following refers to the process of verifying the identity of the receiver of the data? Which of the following are models for e-commerce?
Both A) and B) are e-commerce models Which of the following best characterizes the two statements: A ____ is one of the most popular and widely-used techniques for building computer models. discrete event analysis disconnected event simulation discrete event simulation general event simulation discrete event simulation ____ is the study of how we as humans think and learn. Artificial intelligence Cognitive science Social science Neuroscience Intelligent searching means applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes these differences. heuristic brute force swarm intelligence back propagation The ____ uses heuristic algorithms to allow a robot to respond directly to stimuli from its environment without filtering through some line of reasoning based on its internal understanding of that environment. A ____ executes instructions in parallel with the CPU, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display. GPU NPU PGU GIPU Napster used: point-to-point file sharing peer-to-peer file sharing bit file sharing filesystem mounting peer-to-peer file sharing Which of the following best characterizes the two statements: The test to see if a machine exhibits behavior indistinguishable from a human is called: Which of the following involves an attempt to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion? inference engine intelligent agent back propagation system rule-based system A neural network is presented with ______, for which the correct outputs are known. training data base data correct information weights In the commercial and office environment, the most widely-used broadband technology is _____. ATM token-ring Ethernet SONET The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process. In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. memory locations programs subtasks tasks When a system contains ____, it means that there are parts of the system that display random behavior. stochastic components deterministic components predictable components conventional components Which of the following is a valid definition of an algorithm?An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.
What statements are the question asking operations of an algorithm?control operations allow us to alter the normal sequential flow of control in an algorithm. conditional statements are the question-asking operations of an algorithm.
Which of the following is not a valid requirement of an algorithm?Answer: The algorithm doesn't stop in a finite number of times.
Which of the following compression schemes is lossy?MP3 uses a lossy compression scheme based on the study of human hearing, which allows for a 1:10 compression ratio over raw digital audio data.
|