Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Which of the following data types is mutable?
List
Float
String
Integer
if x = [4, 7, 9, 2], what is x[2]? 4 7 9 2
if x = 5.0 and y = 3, what is the data type of x * y? integer float string list
if python 3.4, if x = 13 and y = 2, what is x/y? 6.5 6 6.0 7
if python 2.7, if x = 13 and y = 2, what is x/y? 6 6.0 6.5 7
The "question-asking" operations of an algorithm are called? control statements conditional statements iterative statements sequential statements
Indicate the data type of
the expression for Python 3.X:
>>>str(2.6)
Boolean Integer Float String
Computer science is the study of? computers how to write computer programs the uses and applications of computers and software algorithms
In computer science terminology, the machine, robot, person, or thing carrying out the steps of an algorithm is called a __?
algorithmic agent computing agent physical agent adaptive agent
Which of the following is NOT part of the formal definition of an algorithm? it produces a result it halts in a finite amount of time it consists of unambiguous operations it consists of step-by-step instructions
it consists of step-by-step instructions
Which of the following statements is CORRECT regarding Leibnitz's Wheel and the Pascaline? They were programmable They are examples of early computers They had memory where information could be stored They were mechanical calculators
They were mechanical calculators
The person who popularized the term "debugging" was: Turing Hopper Babbage Hollerith
The while statement is an example of __? a conditional statement an iterative statement a control statement an infinite loop
Which of the following statements describes the primitives of a computing agent? They are variables that can only store numerical values. They are written in pseudocode and form a basic outline of an algorithm. They are instructions that the computing agent understands and can execute without further explanation or simplification. They evaluate "true/false conditions" to determine if a loop body should be executed.
They are instructions that the computing agent understands and can execute without further explanation or simplification.
Given the following python code, answer the following: >>>x = "3.0" What is type(x)? int float string list
for the function def myFunction(a,b): return 2 * b + a what is myFunction(3, 10)? 3 10 16 23
Indicate the data type of the expression: >>>3 + 5.0 Boolean Integer Float String
Indicate the data type of the expression for Python 3.X: >>>5/2 Boolean Integer Float String
Indicate the data type of the expression for Python 3.X: >>>round(2.6)
Boolean Integer Float String
Indicate the data type of the expression for Python 3.X: >>>5/2 == 5/2.0 Boolean Integer Float String
Given the following program in python, what will be the value returned? N = 3 counter = 0 while (N > 0): counter = counter * N N = N - 1 return counter 0 321 6
Nothing, because the program will be caught up in an infinite loop
What will be the value returned from this script? N = 4 counter = 1 while (N > 0): counter = counter * N N = N - 1 return counter
0 1 6 24
Given the following script in python, What will be value of N when the program terminates? N = 4
counter = 1 while (N > 0): counter = counter * N N = N - 1 return counter
-1 0 1 4
Given the following script in python, what will be printed? N = 0 if (N > 0): print("you entered a positive number") else: print("you are not feeling very positive") if (N == 0): print("you entered zero") ________________________________ you entered zero __ you are not feeling very positive __ you entered a positive number you entered zero __ you are not feeling very positive you entered zero
you are not feeling very positive you entered zero
The list of numbers [6, 2, 3, 1, 5, 4] is to be sorted using BUBBLE SORT. The algorithm for this process involves
nested "for" loops. Which of the following lists is an intermediate result after the first pass over the outer loop has been completed? [2, 6, 3, 1, 5, 4] [1, 2, 3, 6, 5, 4] [1, 2, 3, 4, 5, 6] [2, 3, 1, 5, 4, 6]
A program in python prompts the user for input from the keyboard and will store the value as the variable myAnswer. The user types the value 3.0. At this point, the data type for myAnswer is: int float string list
what is the final value of y when the following statements are entered in python? >>>x = 3 >>>y = x + 1 >>>x = 7 3 4 7 8
Which of the following has the most optimal worst-case run-time complexity (in terms of the lowest order)? In other words, which of the following sorting algorithms is the most efficient (in the worst case)? bubble sort insertion sort selection sort they all have the same run-time complexity
they all have the same run-time complexity
What is the run-time complexity of the following program?
def findTarget(myList, target): count = 0 for item in
myList: if (target == item): count = count + 1 return count
O(1) O(log n) O(n) O(n log n)
Convert (10011)2 to base 10 16 17 18 19
Convert (10011)2 to base 8 (22)8 (23)8 (24)8 (25)8
Convert (10011)2 to base 16 (13)16 (14)16 (15)16 (16)16
Find the sum (110)2 + (111)2. Write your answer in hexadecimal. All answers below should be interpreted properly A B C D
Convert 52 to binary. (110110)2 (110111)2 (110100)2 (110111)2
The amplitude of a wave is a measure of its tone pitch loudness frequency
A(n) ____ is a collection of useful algorithms. primitive binary set library
Library
Correct! We've already seen examples of libraries in our Python programs.
print(), for instance, comes from Python's standard library! You can read more about libraries on page 62 of your text.
Which of the following best characterizes the statements:
A) (13)8 > (F)16
B) (1011)2 > (A)16
Only A is TRUE Only B is TRUE Both A and B are TRUE Both A and B are FALSE
The value of the 4 bit binary string 1110 in two's complement is: -6 -2 3 13
The value of the binary string 1011 in sign/magnitude is: -5 -3 3 11
For the following sequence in python:
x=[1,2,3] y = x y = [4,5,6] At this point, what is x[0] + y[0]?
2 5 8 not defined
For the function defined: def myFun(value): myList = [ ] for i in range(0,2*value): myList.append(i) return myList what is the largest number in the list returned for myFun(5)? 0 5 9 10
Find the bitwise OR for
the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011
Find the bitwise AND for the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011
Find the bitwise XOR for the following 8-bit strings. Your answer must be an 8-bit string without spaces.
11001110 10101011
The True Color RGB encoding scheme uses ___ bits for each color. 1 2 8 24
Which of the following best characterizes the statements: A. DRAM is an example of non-volatile memory
B. DRAM is an example of mutable storage
Only A is true Only B is true Both A and B are true Both A and B are false
Which of the following is NOT a criteria for a binary computer? - The device has two stable energy states - It is possible to switch the state from a 0 to a 1 (or vice versa) by applyling a sufficient amount of energy. - It is possible to sense which state the device is in without permanently destroying the stored value. - It does not have any moving parts
It does not have any moving parts
Which of the following best characterizes the following two statements: A) ASCII can encode more characters than Unicode B) We can encode more numbers using a Base 10 representation than with a Base 2 representation.
Only A is true Only B is true Both A and B are true Both A and B are false
What is wrong with the following algorithm? 1. Set X to be 1 2. Increment X 3. Print X 4. If X > 0, repeat from 2 It does not produce a result. It is ambiguous. It does not halt in a finite amount of time. It is not well-ordered.
It does not halt in a finite amount of time.
Most computer scientists use ____ to design and represent algorithms. natural languages high-level programming languages low-level programming languages pseudocode
Pseudocode Correct! Pseudocode allows us to create precise, unambiguous algorithms without worrying about implementation details,. You can read more about pseudocode on page 42 of the textbook.
Together, conditional and iterative operations are called ____ operations. sequential control hierarchical dynamic
ControlCorrect! Page 46 goes into more detail about control operations.
Which of the following is the OAM command for getting keyboard input? READ 0 GET 0 LOAD 0 LDA 0
Which of the following is the OAM command for printing to the screen? PRINT 0 OUT 0 STA 0 PUT 0
Which of the following OAM programs will store the value 25 in memory slot 10? SET 5 MLT 5 STA 10 HLT ________
SET 15 ADD 10 STA 10 HLT ________ SET 5 STA 10 MLT 10 STA 10 HLT _______ SET 15 STA 10 LDA 10 ADD 10 HLT
SET 5 STA 10 MLT 10 STA 10 HLT
Which of the following OAMPL commands will produce the value 25? (15 + 10) ___ ( / 100 4)
___ (5 x 5) ___ READ 5 MLT 5 PRINT
How many bits are required to encode the OAM operation codes? 1 4
8 16
Which of the following is an example of a high-level programming language? English Python OAM Machine Language
Which of the following is TRUE about machine language? it is readable instructions are given abbreviated names memory addresses must be numeric mathematical symbols are allowed
memory
addresses must be numeric
What is the result of the following OAMPL program?
PRINT (+ 3 (* 4 5))
12 17 23 PRINT (+ 3 (* 4 5))
What is the result of the following OAM program?
SET 10 STA 20 SET 15 ADD 20 STA 0 HLT 35 15 20 25
what is the result of
the following OAMPL line of code?
PRINT (+ 12 (- 5 2))
(+ 12 (- 5 2)) 15 9 5
what will the following OAM code do?
SET 12 STA 6 DIV 6 STA 0 HLT it will crash it will print the value 2 to the screen it will print the value 1 to the screen it will print the value 0 to the screen
it will print the value 1 to the screen
Assembly language is also referred to as a first generation language second generation language binary language high-level programming language
second generation language
Which of the following tasks does an assembler NOT perform? convert symbolic op codes to binary convert symbolic addresses to binary translate a program into machine language read instructions from an object file and store them into memory for execution
read instructions from an object file and store them into memory for execution
What will the following OAM
program print to the output window?
set 10 sta 20 add 20 sta 0 hlt ______ 10 20 30 40
What will the following OAM program print to the output window? set 1 brp skip sta 0 hlt skip, set 5 sta 0 hlt
___ 0 1 5 6
Which of the following layers deals with rules for implementing the end-user services provided by a network? Network layer Application layer Transport layer Data link layer
Embedded computers can be found: in a cell phone in a credit card in a microwave all of the above
Which of the following layers deals with error handling and framing? Network layer Application layer Transport layer Data link layer
Which of the following is a low power wireless standard used to communicate between devices located close to each other? Wi-Fi WAN LAN Bluetooth
Which of the following best characterizes the statements:
A) Networks can be used to share resources like printers and storage B) Routers are used to connect networks
Only A is true Only B is true Both
A and B are true Both A and B are false
Which of the following best characterizes the statements:
A) The ARQ algorithm includes a provision for what to do if a packet is not received. B) A DNS server is used to register domain names
Only A is true Only B is true Both A and B are true Both A and B are false
A keystroke logger is an example of a: virus worm trojan horse denial of service
The science of secret writing is: cryptology cryptography cipherography encryption
Which of the following terms does not belong with the others? shift cipher substitution cipher stream cipher block cipher
The encryption algorithm that TLS/SSL uses is: DES encryption RSA encryption neither DES or RSA encryption both DES and RSA encryption
both DES and RSA encryption
Which of the following best describes the statements:
A. The model of a phenomenon must capture the full functionality of
the real thing. B. Models can only give us information about existing phenomena.
Only A is true Only B is true Both A and B are true Both A and B are false
The practice of impersonating a legitimate site for the purposes of stealing money or stealing identity by collecting confidential information such as credit card numbers, names, and addresses is called: Spooling Spoofing Spamming Scamming
When a system contains _____, it means that there are parts of the system that display random behavior.
stochastic components deterministic components oredictative components conventional components
A ____ is one of the most popular and widely-used techniques for building computer models
discrete event analysis disconnected event simulation discrete event simulation general event simulation
discrete event simulation
Which of the following is NOT a reason to construct a simulation model?
Ethics Time Safety Realism
Which of the following is NOT
an example of a test used to determine if a sequence can be considered to be statistically random?
Frequency test Poker test Uniform test Gap test
A model that uses a random number generator to introduce some variability into the data is considered to be:
Stochastic Discrete Continuous Static
Which of the following best
characterizes the two statements:
A. The Turing machine captures all of the properties that are essential for a computing agent. B. A Turing machine can store information and retrieve it from memory.
Only A is true Only B is true Both A and B are true Both A and B are false
Which of the following statements is TRUE? - Scientists think it is necessary to write a Turing machine when they talk about an algorithmic computation. - A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task. - A Turing machine that is executing an algorithm to solve some task need not halt when begun on a tape containing input appropriate to that task. - Simply running the Turing machine enables us to make a decision about halting.
A Turing machine that is executing an algorithm to solve some task must halt when begun on a tape containing input appropriate to that task.
A Turing machine always contains a special symbol for: 0 1 blank x
Characterize the following statements:
A) There are problems for which no algorithmic solution exists B) A computing agent must be able to accept
input
Only A is true Only B is true Both A and B are true Both A and B are false
Which of the following refers to the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose? Cybersquatting DNS squatting URL squatting Website squatting
Web personalization is possible using:
cookies worms encryption javascript
Which of the following refers to the process of verifying the identity of the receiver of the data?
Authentication Authorization Certification Validation
Which of the following are models for e-commerce?
A) E-bay B) Craigslist
Only A) is an e-commerce model Only B) is an e-commerce model Both A) and B) are e-commerce models Both A) and B) are NOT e-commerce models
Both A) and B) are e-commerce models
Which of the following best characterizes the two statements:
A. A brute force approach is commonly used for intelligent chess-playing strategy B. Any
knowledge representation scheme we select must be relatively easy to etend to include new knowledge.
Only A is true Only B is true Both A and B are true Both A and B are false
A ____ is one of the most popular and widely-used techniques for building computer models. discrete event analysis disconnected event simulation discrete event simulation general event simulation
discrete event simulation
____ is the study of how we as humans think and learn. Artificial intelligence Cognitive science Social science Neuroscience
Intelligent searching means applying some ____ to evaluate the differences between the present state and the goal state, and to move us to a new state that minimizes these differences. heuristic brute force swarm intelligence back propagation
The ____ uses heuristic algorithms to allow a robot to respond directly to stimuli from its environment without filtering through some line of reasoning based on its internal understanding of that environment.
explanation facility proactive strategy
deliberative strategy reactive strategy
A ____ executes instructions in parallel with the CPU, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display. GPU NPU PGU GIPU
Napster used: point-to-point file sharing peer-to-peer file sharing bit file sharing filesystem mounting
peer-to-peer file sharing
Which of the following best characterizes the two statements:
A. A robot must not only gather sensory information, but filter out the possibly vast amount of data its surroundings might present to it. B. Game playing and image analysis are applications of artificial intelligence.
Only A
is true Only B is true Both A and B are true Both A and B are false
The test to see if a machine exhibits behavior indistinguishable from a human is called:
Computer intelligence test Turing test AI test Cognitive test
Which of the following involves an attempt to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion? inference engine intelligent agent back propagation system rule-based system
A neural network is presented with ______, for which the correct outputs are known. training data base data correct information weights
In the commercial and office environment, the most widely-used broadband technology is _____. ATM token-ring Ethernet SONET
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong ____ and authorization process.
authentication encryption access interference
In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____. memory locations programs subtasks tasks
When a system contains ____, it means that there are parts of the system that display random behavior. stochastic components deterministic components predictable components conventional components