Test Bank C How to Program 9th Edition Paul Deite

$35.00
Test Bank C How to Program 9th Edition Paul Deite

Test Bank C How to Program 9th Edition Paul Deite

$35.00
Test Bank C How to Program 9th Edition Paul Deite

Test Bank C How to Program 9th Edition Paul Deite

1.1 Introduction

1.1 Q1: Which of the following statements is true?

  1. Hardware controls software.
  2. Software controls hardware.
  3. C is an object-oriented programming language.
  4. Both (b) and (c) are true.

ANS: b.

1.1 Q2: Which of the following statements a), b) or c) is false?

  1. Decades ago, most computer applications ran on networked computers.
  2. Today's applications can be written with the aim of communicating among the world's computers via the Internet.
  3. A key intersection between computer science and data science is artificial intelligence.
  4. All of the above statements are true.

ANS: a. Decades ago, most computer applications ran on networked computers. Actually, decades ago, most computer applications ran on "standalone" computers (that is, not networked together).

1.2 Hardware and Software

1.2 Q1: Which of the following statements is false?

  1. Computers can perform calculations and make logical decisions phenomenally faster than human beings can.
  2. Computers process data under the control of sequences of instructions called computer programs (or simply programs).
  3. A computer consists of various physical devices referred to as hardware (such as the keyboard, screen, mouse, solid-state disks, hard disks, memory,
  4. Computing costs are rising dramatically, due to the increasing complexity of hardware and software technologies.

ANS: d. Actually, computing costs are dropping dramatically, due to rapid developments in hardware and software technologies.

1.2.1 Moore’s Law

1.2 Q2: Every year or two, the capacities of computers have approximately doubled inexpensively. This remarkable trend often is called ________.

  1. the law of large numbers
  2. the principal of least privilege
  3. Moore's law
  4. Wirth's law

ANS: c.

1.2.2 Computer Organization

1.2 Q3: Which logical unit of the computer is the receiving section?

  1. input unit
  2. output unit
  3. memory unit
  4. central processing unit.

ANS: a.

1.2 Q4: Information in the memory unit is ________. It's typically lost when the computer's power is turned off.

  1. persistent
  2. constant
  3. sticky
  4. volatile

ANS: d.

1.2 Q5: A gigabyte is approximately one ________ bytes.

  1. thousand
  2. million
  3. billion
  4. trillion.

ANS: c.

1.2 Q6: The arithmetic and logic unit contains the ________ mechanisms that allow the computer, for example, to compare two items from the memory unit to determine whether they're equal.

  1. decision
  2. calculation
  3. addition
  4. None of the above.

ANS: a.

1.2 Q7: Information on secondary storage devices is ________ — it's preserved even when the computer's power is turned off.

  1. volatile
  2. unstable
  3. transient
  4. persistent

ANS: d.

1.2 Q8: Secondary storage information takes much ________ to access than information in primary memory, but its cost per unit is much ________.

  1. less time, less
  2. longer, less
  3. less time, more
  4. longer, more

ANS: b.

1.3 Data Hierarchy

1.3 Q1: A(n) ________ is the smallest data item in a computer. It can have the value 0 or 1.

  1. bit
  2. byte
  3. field
  4. record

ANS: a.

1.3 Q2: Which of the following statements a), b) or c) is false?

  1. A computer's character set represents every character as a pattern of 1s and 0s.
  2. All Unicode® characters are composed of four bytes (32 bits).
  3. Unicode contains characters for many of the world's languages.
  4. All of the above statements are true.

ANS: b. Actually, Unicode® characters are composed of one, two, three or four bytes (8, 16, 24 or 32 bits, respectively).

1.3 Q3: The most popular database model is the ________ database, in which data is stored in simple tables.

  1. network
  2. graph
  3. relational
  4. hierarchical

ANS: c.

1.3 Q4: Which one of the following statements is true?

  1. a terabyte is larger than a petabyte.
  2. a kilobyte is exactly 1000 bytes.
  3. a gigabyte is 1024 megabytes.
  4. an exabyte is 1024 zettabytes.

ANS: c.

1.4 Machine Languages, Assembly Languages and High-Level Languages

1.4 Q1: Which of the following statements a), b) or c) is false?

  1. Any computer can directly understand only its own machine language, defined by its hardware design.
  2. Translator programs called assemblers convert assembly-language programs to machine language at computer speeds.
  3. Interpreter programs, developed to execute high-level language programs directly, avoid the delay of compilation, and run faster than compiled programs.
  4. d) All of the above statements are true.

ANS: c. Actually, interpreter programs run slower than compiled programs.

1.4 Q2: Which of the following statements is false?

  1. With the advent of assembly languages, computer usage increased rapidly, but programmers still had to use numerous instructions to accomplish even the simplest tasks.
  2. To speed the programming process, high-level languages were developed in which single statements could be written to accomplish substantial tasks.
  3. Translator programs called assemblers convert high-level-language source code into machine language.
  4. High-level languages instructions look almost like every-day English and contain commonly used mathematical notations.

ANS: c. Actually, those translator programs are compilers. Assemblers convert assembly language programs into machine language.

1.5 Operating Systems

1.5 Q1: Windows is a(n) ________ operating system—it's controlled by Microsoft exclusively.

  1. proprietary
  2. private
  3. open source
  4. None of the above.

ANS: a.

1.5 Q2: ________ is by far the world's most widely used desktop operating system.

  1. Linux
  2. MacOS
  3. Windows
  4. none of the above

ANS: c.

1.5 Q3: With ________ software development, individuals and companies contribute their efforts in developing, maintaining and evolving software in exchange for the right to use that software for their own purposes, typically at no charge.

  1. object-oriented
  2. high-level
  3. open-source
  4. proprietary

ANS: c.

1.5 Q4: Which of the following organizations has millions of open-source projects under development?

  1. Python Software Foundation
  2. GitHub
  3. The Apache Software Foundation
  4. The Eclipse Foundation

ANS: b.

1.6 The C Programming Language

1.6 Q1: Which of the following languages was an ancestor of C?

  1. A
  2. A+
  3. B
  4. B+

ANS: c.

1.7 The C Standard Library and Open-Source Libraries

1.7 Q1: Which of the following are sources of building blocks that you’ll use to build your C programs?

  1. Functions from the C standard library.
  2. Functions you create yourself.
  3. Functions from open-source C libraries.
  4. All of the above.

ANS: d.

1.7 Q2: Which of the following are true regarding why standard library functions can be more efficient?

  1. They save programming time.
  2. They are carefully written to perform optimally.
  3. They increase program portability.
  4. All of the above.

ANS: d.

1.8 Other Popular Programming Languages

1.8 Q1: C++ was developed by ________.

  1. Bjarne Stroustrup
  2. Ada Lovelace
  3. Blaise Pascal
  4. Ken Thompson

ANS: a.

1.8 Q2: Which language was developed by Microsoft for integrating the Internet and the web into computer applications?

  1. Objective-C.
  2. Java.
  3. PHP.
  4. C#.

ANS: d.

1.8 Q3: Java was developed by ___________.

  1. Sun Microsystems
  2. Bell Labs
  3. IBM
  4. ANSI/ISO

ANS: a.

1.9 Typical C Program-Development Environment

1.9 Q1: The compile stage is when ____________.

  1. the object code is linked with code for functions in other files
  2. the C program is translated into machine language code
  3. the program is executed one instruction at a time
  4. the program is placed in memory

ANS: b.

1.9 Q2: The linker creates __________.

  1. an executable image
  2. a preprocessor directive
  3. object code
  4. an input stream

ANS: a.

1.10 Test-Driving a C Application in Windows, Linux and macOS

No questions.

1.11 Internet, World Wide Web, the Cloud and IoT

1.11 Q1: Which of the following statements about the ARPANET and the Internet is false?

  1. The ARPANET was the precursor to today's Internet.
  2. Today's fastest Internet speeds are on the order of millions of bits per second with billion-bits-per-second (gigabit) speeds already being tested.
  3. Although the ARPANET enabled researchers to network their computers, its main benefit proved to be the capability for quick and easy communication via what came to be known as electronic mail (e-mail).
  4. The protocol (set of rules) for communicating over the ARPANET became known as the Transmission Control Protocol (TCP). TCP ensured that messages, consisting of sequentially numbered pieces called packets, were properly delivered from sender to receiver, arrived intact and were assembled in the correct order.

ANS: b. Actually, today's fastest Internet speeds are on the order of billions of bits per second with trillion-bits-per-second (terabit) speeds already being tested.

1.11.1 The Internet: A Network of Networks

1.11 Q2: Which of the following statements about the Internet is false?

  1. One challenge was to enable different networks to communicate with each other. ARPA accomplished this by developing the Internet Protocol (IP), which created a true "network of networks," the current architecture of the Internet.
  2. The combined set of Internet protocols is now called TCP/IP.
  3. Each Internet-connected- device has a TCP address—a unique numerical identifier used by devices communicating via TCP/IP to locate one another on the Internet.
  4. Bandwidth—the information-carrying capacity of communications lines—on the Internet has increased tremendously, while hardware costs have plummeted.

ANS: c. Each Internet-connected- device has a TCP address—a unique numerical identifier used by devices communicating via TCP/IP to locate one another on the Internet. Actually, each Internet-connected device has an IP address—a unique numerical identifier used by devices communicating via TCP/IP to locate one another on the Internet.

1.11.2 The World Wide Web: Making the Internet User-Friendly

1.11 Q3: Which of the following statements is false?

  1. The World Wide Web is a collection of hardware and software associated with the Internet that allows computer users to locate and view documents (with various combinations of text, graphics, animations, audios and videos) on almost any subject.
  2. In 1989, Tim Berners-Lee of CERN (the European Organization for Nuclear Research) began developing HyperText Markup Language (HTML)—the technology for sharing information via "hyperlinked" text documents.
  3. Berners-Lee also wrote communication protocols such as JavaScript Object Notation (JSON) to form the backbone of his new hypertext information system, which he referred to as the World Wide Web.
  4. In 1994, Berners-Lee founded the World Wide Web Consortium (W3C), devoted to developing web technologies.

ANS: c. Actually, in 1989, Tim Berners-Lee of CERN (the European Organization for Nuclear Research) began developing HyperText Markup Language (HTML)—the technology for sharing information via "hyperlinked" text documents.

1.11.3 The Cloud

1.11 Q4: The applications-development methodology of ________ enables you to rapidly develop powerful software applications by combining (often free) complementary web services and other forms of information feeds.

  1. cloud computing
  2. design patterns
  3. proprietary computing
  4. mashups

ANS: d.

1.11.4 The Internet of Things

1.11 Q5: The Internet is no longer just a network of computers—it's an Internet of Things. A thing is any object with which of the following?

  1. an IP address
  2. the ability to send data over the Internet
  3. in some cases, the ability to receive data over the Internet
  4. Things can have all of the above.

ANS: d.

1.12 Software Technologies

1.12 Q1: Reworking programs to make them clearer and easier to maintain while preserving their correctness and functionality is called ________.

  1. refactoring
  2. design patterns
  3. editing
  4. None of the above.

ANS: a.

1.12 Q2: Proven architectures for constructing flexible and maintainable object-oriented software are called ________.

  1. refactored architectures
  2. software blueprints
  3. engineered architectures
  4. design patterns

ANS: d.

1.13 How Big Is Big Data?

1.13 Q1: Which of the following statements about big data is false?

  1. For computer scientists and data scientists, data is now as important as writing programs.
  2. One megabyte is exactly one million (1,000,000) bytes.
  3. A March 2016 AnalyticsWeek article stated that by there would be over 50 billion devices connected to the Internet (most of them through the Internet of Things), and by 2020 there would be 1.7 megabytes of new data every second for every person on the planet.
  4. The speed at which quantum computers now under development could operate at is so extraordinary that in one second, a quantum computer theoretically could do staggeringly more calculations than the total that have been done by all computers since the world’s first computer appeared.

ANS: b. Actually, one megabyte is exactly 220 = 1024 x 1024 = 1,048,576 bytes.

1.13 Q2: Which of the following statements about energy consumption is false?

  1. According to a recent article, energy use for processing data in 2015 was growing at 20% per year and consuming approximately three to five percent of the world's power.
  2. Another enormous electricity consumer is the blockchain-based cryptocurrency Bitcoin—processing just one Bitcoin transaction uses approximately the same amount of energy as powering the average American home for a year.
  3. The energy use comes from the process Bitcoin "miners" use to prove that transaction data is valid.
  4. Together, Bitcoin and Ethereum (another popular blockchain-based platform and cryptocurrency) consume more energy per year than Finland, Belgium or Pakistan.

ANS: b. Actually, processing just one Bitcoin transaction uses approximately the same amount of energy as powering the average American home for a week.

1.13.1 Big-Data Analytics

1.13 Q3: Which of the following "V's of big data" is described by "the validity of the data—is it complete and accurate? Can we trust that data when making crucial decisions? Is it real?

  1. Volume
  2. Velocity
  3. Variety
  4. Veracity

ANS: d.

1.13.2 Data Science and Big Data Are Making a Difference: Use Cases

No questions.

1.14 Case Study—A Big-Data Mobile Application

1.14 Q1: Once Waze converts a spoken command to text, it must determine the correct action to perform, which requires:

  1. JSON
  2. speech recognition
  3. natural language processing
  4. speech synthesis

ANS: c.

1.14 Q2: Each of the following statements about a typical mobile social navigation app is true and most captures the essence of the application?

  1. The app processes massive amounts of crowdsourced data—that is, the data that's continuously supplied by users through their mobile GPS-based devices worldwide.
  2. The app uses speech synthesis to speak driving directions and alerts to you, and speech recognition to understand your spoken commands.
  3. The app uses your phone as a streaming Internet of Things (IoT) device. Each phone is a GPS sensor that continuously streams data over the Internet to the app.
  4. The app probably stores its routing information in a graph database. Such databases can efficiently calculate shortest routes.

ANS: a.

1.15 AI—at the Intersection of Computer Science and Data Science

1.15 Q1: What is the "ultimate goal" of the field of artificial intelligence?

  1. Computers learning from massive amounts of data.
  2. Computer vision.
  3. Self-driving cars.
  4. Artificial general intelligence—computers that perform intelligence tasks as well as humans.

ANS: d.

1.15 Q2: Which of the following statements about AI is false?

  1. For many decades, AI has been a field with solutions and no problems.
  2. Google's AlphaZero is a game-playing AI that teaches itself to play games.
  3. In a 1997 match between IBM's DeepBlue computer system and chess Grandmaster Gary Kasparov, DeepBlue became the first computer to beat a reigning world chess champion under tournament conditions.
  4. After training- itself in Go for just eight hours, AlphaZero was able to play Go vs. its AlphaGo predecessor, winning 60 of 100 games.

ANS: a. Actually, for many decades, AI has been a field with problems and no solutions.

+
-
Only 0 units of this product remain

You might also be interested in