Which of the following statements describes the primitives of a computing agent?

Recommended textbook solutions

Which of the following statements describes the primitives of a computing agent?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which of the following statements describes the primitives of a computing agent?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Which of the following statements describes the primitives of a computing agent?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which of the following statements describes the primitives of a computing agent?

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Which of the following data types is mutable?
List
Float
String
Integer

if x = [4, 7, 9, 2], what is x[2]? 4 7 9 2

if x = 5.0 and y = 3, what is the data type of x * y? integer float string list

if python 3.4, if x = 13 and y = 2, what is x/y? 6.5 6 6.0 7

if python 2.7, if x = 13 and y = 2, what is x/y? 6 6.0 6.5 7

The "question-asking" operations of an algorithm are called?   control statements   conditional statements   iterative statements   sequential statements

Indicate the data type of the expression for Python 3.X:
>>>str(2.6)
  Boolean   Integer   Float   String

Computer science is the study of? computers how to write computer programs the uses and applications of computers and software algorithms

In computer science terminology, the machine, robot, person, or thing carrying out the steps of an algorithm is called a __?
algorithmic agent computing agent physical agent adaptive agent

Which of the following is NOT part of the formal definition of an algorithm?   it produces a result   it halts in a finite amount of time   it consists of unambiguous operations   it consists of step-by-step instructions

it consists of step-by-step instructions

Which of the following statements is CORRECT regarding Leibnitz's Wheel and the Pascaline?   They were programmable   They are examples of early computers   They had memory where information could be   stored They were mechanical calculators

They were mechanical calculators

The person who popularized the term "debugging" was:   Turing   Hopper   Babbage   Hollerith

The while statement is an example of __?   a conditional statement   an iterative statement   a control statement   an infinite loop

Which of the following statements describes the primitives of a computing agent? They are variables that can only store numerical values. They are written in pseudocode and form a basic outline of an algorithm. They are instructions that the computing agent understands and can execute without further explanation or simplification. They evaluate "true/false conditions" to determine if a loop body should be executed.

They are instructions that the computing agent understands and can execute without further explanation or simplification.

Given the following python code, answer the following: >>>x = "3.0" What is type(x)?   int   float   string   list

for the function     def myFunction(a,b):           return 2 * b + a what is myFunction(3, 10)?   3   10   16   23

Indicate the data type of the expression: >>>3 + 5.0   Boolean   Integer   Float   String

Indicate the data type of the expression for Python 3.X: >>>5/2   Boolean   Integer   Float   String

Indicate the data type of the expression for Python 3.X: >>>round(2.6)
  Boolean   Integer   Float   String

Indicate the data type of the expression for Python 3.X: >>>5/2 == 5/2.0   Boolean   Integer   Float   String

Given the following program in python, what will be the value returned? N = 3 counter = 0 while (N > 0):     counter = counter * N     N = N - 1 return counter   0 321 6 Nothing, because the program will be caught up in an infinite loop

What will be the value returned from this script? N = 4 counter = 1 while (N > 0):       counter = counter * N       N = N - 1 return counter
  0   1   6   24

Given the following script in python, What will be value of N when the program terminates? N = 4 counter = 1 while (N > 0):       counter = counter * N       N = N - 1 return counter
  -1   0   1   4

Given the following script in python, what will be printed? N = 0 if (N > 0):     print("you entered a positive number") else:     print("you are not feeling very positive") if (N == 0):     print("you entered zero") ________________________________ you entered zero __ you are not feeling very positive __ you entered a positive number you entered zero __   you are not feeling very positive you entered zero

you are not feeling very positive you entered zero

The list of numbers [6, 2, 3, 1, 5, 4] is to be sorted using BUBBLE SORT. The algorithm for this process involves nested "for" loops. Which of the following lists is an intermediate result after the first pass over the outer loop has been completed?   [2, 6, 3, 1, 5, 4]   [1, 2, 3, 6, 5, 4]   [1, 2, 3, 4, 5, 6]   [2, 3, 1, 5, 4, 6]

A program in python prompts the user for input from the keyboard and will store the value as the variable myAnswer. The user types the value 3.0. At this point, the data type for myAnswer is:   int   float   string   list

what is the final value of y when the following statements are entered in python? >>>x = 3 >>>y = x + 1 >>>x = 7   3   4   7   8

Which of the following has the most optimal worst-case run-time complexity (in terms of the lowest order)? In other words, which of the following sorting algorithms is the most efficient (in the worst case)?   bubble sort   insertion sort   selection sort   they all have the same run-time complexity

they all have the same run-time complexity

What is the run-time complexity of the following program?
def findTarget(myList, target):     count = 0     for item in myList:         if (target == item):               count = count + 1     return count
  O(1)   O(log n)   O(n)   O(n log n)

Convert (10011)2 to base 10   16   17   18   19

Convert (10011)2 to base 8   (22)8   (23)8   (24)8   (25)8

Convert (10011)2 to base 16   (13)16   (14)16   (15)16   (16)16

Find the sum (110)2 + (111)2. Write your answer in hexadecimal. All answers below should be interpreted properly   A   B   C   D

Convert 52 to binary.   (110110)2   (110111)2   (110100)2   (110111)2

The amplitude of a wave is a measure of its   tone   pitch   loudness   frequency

A(n) ____ is a collection of useful algorithms.   primitive   binary   set   library

Library
Correct! We've already seen examples of libraries in our Python programs. print(), for instance, comes from Python's standard library! You can read more about libraries on page 62 of your text.

Which of the following best characterizes the statements:
A) (13)8 > (F)16
B) (1011)2 > (A)16
  Only A is TRUE   Only B is TRUE   Both A and B are TRUE   Both A and B are FALSE

The value of the 4 bit binary string 1110 in two's complement is:   -6   -2   3   13

The value of the binary string 1011 in sign/magnitude is:   -5   -3   3   11

For the following sequence in python:
x=[1,2,3] y = x y = [4,5,6] At this point, what is x[0] + y[0]?
  2   5   8   not defined

For the function defined: def myFun(value):             myList = [ ]             for i in range(0,2*value):                         myList.append(i)             return myList what is the largest number in the list returned for myFun(5)?     0   5   9   10

Find the bitwise OR for the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011

Find the bitwise AND for the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011

Find the bitwise XOR for the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011

The True Color RGB encoding scheme uses ___ bits for each color.   1   2   8   24

Which of the following best characterizes the statements: A. DRAM is an example of non-volatile memory
B. DRAM is an example of mutable storage
Only A is true Only B is true   Both A and B are true   Both A and B are false

Which of the following is NOT a criteria for a binary computer? - The device has two stable energy states - It is possible to switch the state from a 0 to a 1 (or vice versa) by applyling a sufficient amount of energy. - It is possible to sense which state the device is in without permanently destroying the stored value. - It does not have any moving parts

It does not have any moving parts

Which of the following best characterizes the following two statements: A) ASCII can encode more characters than Unicode B) We can encode more numbers using a Base 10 representation than with a Base 2 representation.
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

What is wrong with the following algorithm? 1. Set X to be 1 2. Increment X 3. Print X 4. If X > 0, repeat from 2   It does not produce a result.   It is ambiguous.   It does not halt in a finite amount of time.   It is not well-ordered.

It does not halt in a finite amount of time.

Most computer scientists use ____ to design and represent algorithms.   natural languages   high-level programming languages   low-level programming languages   pseudocode

Pseudocode Correct! Pseudocode allows us to create precise, unambiguous algorithms without worrying about implementation details,. You can read more about pseudocode on page 42 of the textbook.

Together, conditional and iterative operations are called ____ operations.   sequential   control   hierarchical   dynamic

ControlCorrect! Page 46 goes into more detail about control operations.

Which of the following is the OAM command for getting keyboard input? READ 0 GET 0 LOAD 0 LDA 0

Which of the following is the OAM command for printing to the screen?   PRINT 0   OUT 0   STA 0   PUT 0

Which of the following OAM programs will store the value 25 in memory slot 10?   SET 5 MLT 5 STA 10 HLT ________  
SET 15 ADD 10 STA 10 HLT ________   SET 5 STA 10 MLT 10 STA 10 HLT _______ SET 15 STA 10 LDA 10 ADD 10 HLT

SET 5 STA 10 MLT 10 STA 10 HLT

Which of the following OAMPL commands will produce the value 25?   (15 + 10) ___ ( / 100 4)
___ (5 x 5) ___ READ 5 MLT 5 PRINT

How many bits are required to encode the OAM operation codes?   1 4
8 16

Which of the following is an example of a high-level programming language?   English   Python   OAM   Machine Language

Which of the following is TRUE about machine language?   it is readable   instructions are given abbreviated names   memory addresses must be numeric   mathematical symbols are allowed

memory addresses must be numeric

What is the result of the following OAMPL program?
PRINT (+ 3 (* 4 5))
  12   17   23   PRINT (+ 3 (* 4 5))

What is the result of the following OAM program?
SET 10 STA 20 SET 15 ADD 20 STA 0 HLT   35   15   20   25

what is the result of the following OAMPL line of code?
PRINT (+ 12 (- 5 2))
  (+ 12 (- 5 2))   15   9   5

what will the following OAM code do?
SET 12 STA 6 DIV 6 STA 0 HLT   it will crash   it will print the value 2 to the screen   it will print the value 1 to the screen   it will print the value 0 to the screen

  it will print the value 1 to the screen

Assembly language is also referred to as a   first generation language   second generation language   binary language   high-level programming language

second generation language

Which of the following tasks does an assembler NOT perform? convert symbolic op codes to binary convert symbolic addresses to binary translate a program into machine language read instructions from an object file and store     them into memory for execution

read instructions from an object file and store them into memory for execution

What will the following OAM program print to the output window?
set 10 sta 20 add 20 sta 0 hlt ______   10   20   30   40

What will the following OAM program print to the output window? set 1 brp skip sta 0 hlt skip, set 5 sta 0 hlt
___   0   1   5   6

Which of the following layers deals with rules for implementing the end-user services provided by a network?   Network layer   Application layer   Transport layer   Data link layer

Embedded computers can be found:   in a cell phone   in a credit card   in a microwave   all of the above

Which of the following layers deals with error handling and framing?   Network layer   Application layer   Transport layer   Data link layer

Which of the following is a low power wireless standard used to communicate between devices located close to each other?   Wi-Fi   WAN   LAN   Bluetooth

Which of the following best characterizes the statements:
A) Networks can be used to share resources like printers and storage B) Routers are used to connect networks
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

Which of the following best characterizes the statements:
A) The ARQ algorithm includes a provision for what to do if a packet is not received. B) A DNS server is used to register domain names
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

A keystroke logger is an example of a:   virus   worm   trojan horse   denial of service

The science of secret writing is:   cryptology   cryptography   cipherography   encryption

Which of the following terms does not belong with the others?   shift cipher   substitution cipher   stream cipher   block cipher

The encryption algorithm that TLS/SSL uses is:   DES encryption   RSA encryption   neither DES or RSA encryption   both DES and RSA encryption

  both DES and RSA encryption

Which of the following best describes the statements:
A. The model of a phenomenon must capture the full functionality of the real thing. B. Models can only give us information about existing phenomena.
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

The practice of impersonating a legitimate site for the purposes of stealing money or stealing identity by collecting confidential information such as credit card numbers, names, and addresses is called:   Spooling   Spoofing   Spamming   Scamming

When a system contains _____, it means that there are parts of the system that display random behavior.
  stochastic components   deterministic components   oredictative components   conventional components

A ____ is one of the most popular and widely-used techniques for building computer models
  discrete event analysis   disconnected event simulation   discrete event simulation   general event simulation

discrete event simulation

Which of the following is NOT a reason to construct a simulation model?
  Ethics   Time   Safety   Realism

Which of the following is NOT an example of a test used to determine if a sequence can be considered to be statistically random?
  Frequency test   Poker test   Uniform test   Gap test

A model that uses a random number generator to introduce some variability into the data is considered to be:
  Stochastic   Discrete   Continuous   Static

Which of the following best characterizes the two statements:
A. The Turing machine captures all of the properties that are essential for a computing agent. B. A Turing machine can store information and retrieve it from memory.
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

Which of the following statements is TRUE? - Scientists think it is necessary to write a Turing machine when they talk about an algorithmic computation. - A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task. - A Turing machine that is executing an algorithm to solve some task need not halt when begun on a tape containing input appropriate to that task. - Simply running the Turing machine enables us to make a decision about halting.

A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task.

A Turing machine always contains a special symbol for:   0   1   blank   x

Characterize the following statements:
A) There are problems for which no algorithmic solution exists B) A computing agent must be able to accept input
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

Which of the following refers to the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose?   Cybersquatting DNS squatting URL squatting Website squatting

Web personalization is possible using:
  cookies   worms   encryption   javascript

Which of the following refers to the process of verifying the identity of the receiver of the data?
Authentication Authorization Certification Validation

Which of the following are models for e-commerce?
A) E-bay B) Craigslist
Only A) is an e-commerce model Only B) is an e-commerce model Both A) and B) are e-commerce models Both A) and B) are NOT e-commerce models

Both A) and B) are e-commerce models

Which of the following best characterizes the two statements:
A. A brute force approach is commonly used for intelligent chess-playing strategy B. Any knowledge representation scheme we select must be relatively easy to etend to include new knowledge.
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

A ____ is one of the most popular and widely-used techniques for building computer models.   discrete event analysis   disconnected event simulation   discrete event simulation   general event simulation

discrete event simulation 

____ is the study of how we as humans think and learn.   Artificial intelligence   Cognitive science   Social science   Neuroscience

Intelligent searching means applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes these differences.   heuristic   brute force   swarm intelligence   back propagation

The ____ uses heuristic algorithms to allow a robot to respond directly to stimuli from its environment without filtering through some line of reasoning based on its internal understanding of that environment.
  explanation facility   proactive strategy   deliberative strategy   reactive strategy

A ____ executes instructions in parallel with the CPU, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display.   GPU   NPU   PGU   GIPU

Napster used:   point-to-point file sharing   peer-to-peer file sharing   bit file sharing   filesystem mounting

peer-to-peer file sharing

Which of the following best characterizes the two statements:
A. A robot must not only gather sensory information, but filter out the possibly vast amount of data its surroundings might present to it. B. Game playing and image analysis are applications of artificial intelligence.
  Only A is true   Only B is true   Both A and B are true   Both A and B are false

The test to see if a machine exhibits behavior indistinguishable from a human is called:
Computer intelligence test Turing test   AI test Cognitive test

Which of the following involves an attempt to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion? inference engine   intelligent agent   back propagation system   rule-based system

A neural network is presented with ______, for which the correct outputs are known.   training data   base data   correct information   weights

In the commercial and office environment, the most widely-used broadband technology is _____.   ATM   token-ring   Ethernet   SONET

The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.
  authentication   encryption   access   interference

In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____.   memory locations   programs   subtasks   tasks

When a system contains ____, it means that there are parts of the system that display random behavior.   stochastic components   deterministic components   predictable components   conventional components

Which of the following is a valid definition of an algorithm?

An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

What statements are the question asking operations of an algorithm?

control operations allow us to alter the normal sequential flow of control in an algorithm. conditional statements are the question-asking operations of an algorithm.

Which of the following is not a valid requirement of an algorithm?

Answer: The algorithm doesn't stop in a finite number of times.

Which of the following compression schemes is lossy?

MP3 uses a lossy compression scheme based on the study of human hearing, which allows for a 1:10 compression ratio over raw digital audio data.