Deck 1: The Craft of Programming
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 1: The Craft of Programming
1
Both instructions and data in a digital computer are represented as binary digits.
True
2
The term numeric data refers to values that can be used in mathematical calculations.
True
3
The term raw binary data refers to letters, punctuation marks, and digits that can be displayed or printed.
False
4
Text data includes special formats, such as image, video, and sound files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Modules are grouped into programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The processor is an integrated circuit contained on a chip usually made of silicon.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The arithmetic logic unit can be thought of as a traffic manager. It handles the instructions sent to it by application programs, the operating system, and system devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Read-only memory is the temporary storage place for instructions and data while the computer is running.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The most common storage devices are electromagnetic hard drives, electronic USB flash drives and memory cards, and optical CDs and DVDs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Sequential access memory is like a cassette tape or VHS tape, which requires starting at the current location and fast-forwarding or rewinding to get to the track or segment you're looking for.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
RAM contains instructions for the system to perform a self-test as it powers up and to load the operating system from hard drive storage into main memory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Pseudocode was developed as a consistent and easily understood method of describing logic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In programming, syntax rules are used for order, spacing, indentation, and punctuation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Keywords are terms reserved for special purposes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
There are three main categories of errors: logic errors (violations of language rules), runtime errors (incorrect instructions, such as adding instead of multiplying), and syntax errors (errors not known until the program runs, such as a missing data file).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The American Standard Code for Information Interchange (ASCII) character-coding system uses 8 bits, consisting of a unique arrangement of eight 0s and 1s for each character.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Unicode is a 32-bit system, capable of 65,536 characters.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Memory locations are used to store strings, in other words, the numeric or text data you want to keep track of.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Named constants can be changed while the program is running.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Variables can be assigned the value of another variable, as long as they both have the same data type.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
For numeric assignments, the value on the right must be a string literal or the name of a string variable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
For string assignments, the value on the right must be a numeric literal or the name of a numeric variable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Numeric assignments can include arithmetic calculations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The most common types of output are to the user's screen (called "hard copy") or to a printer (called "soft copy").
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
For the user to know what values are to be entered at the right time, the instruction, or prompt, must be displayed onscreen.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Computer ____ is the process of formulating instructions to operate a digital computer, an electronic device that can receive, process, store, and send data.
A) architecture
B) formatting
C) programming
D) engineering
A) architecture
B) formatting
C) programming
D) engineering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The most basic instructions to the computer's processor are stored as sequences of bits and make up the computer's ____.
A) machine language
B) algorithm
C) read-only memory
D) random access memory
A) machine language
B) algorithm
C) read-only memory
D) random access memory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The term ____ is used to refer to the raw information processed by computers and is stored in digital form.
A) syntax
B) data
C) literal
D) byte
A) syntax
B) data
C) literal
D) byte
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A computer and its related equipment are collectively called ____.
A) hardware
B) literals
C) circuits
D) software
A) hardware
B) literals
C) circuits
D) software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____ is a digital representation of instructions on the computer.
A) Hardware
B) Data
C) Pseudocode
D) Software
A) Hardware
B) Data
C) Pseudocode
D) Software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The computer system unit (the box enclosing the equipment) includes the ____, which is the electronic circuit board that connects the system's main components.
A) ALU
B) motherboard
C) control unit
D) video card
A) ALU
B) motherboard
C) control unit
D) video card
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The ____ can be thought of as a traffic manager, which handles the instructions sent to it by application programs, the operating system, and system devices.
A) video card
B) main memory
C) control unit
D) arithmetic logic unit
A) video card
B) main memory
C) control unit
D) arithmetic logic unit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A small area of memory, ____, contains instructions for the system to perform a self-test as it powers up and to load the operating system from hard drive storage into main memory.
A) read-only memory
B) the control unit
C) random access memory
D) the ALU
A) read-only memory
B) the control unit
C) random access memory
D) the ALU
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The following is an example of a(n) ____.

A) assignment statement
B) algorithm
C) named constant
D) machine language

A) assignment statement
B) algorithm
C) named constant
D) machine language
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The list below identifies the characteristics of a(n) ____.
• It's logically correct (provides a satisfactory solution to the problem).
• It's efficient (uses suitable programming tools without wasting time or resources).
• It's easy to understand (can be explained in ordinary language).
A) assignment statement
B) algorithm
C) named constant
D) machine language
• It's logically correct (provides a satisfactory solution to the problem).
• It's efficient (uses suitable programming tools without wasting time or resources).
• It's easy to understand (can be explained in ordinary language).
A) assignment statement
B) algorithm
C) named constant
D) machine language
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The decimal equivalent of 11101010 is ____.
A) 170
B) 190
C) 202
D) 234
A) 170
B) 190
C) 202
D) 234
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The binary equivalent of 232 is ____.
A) 10011011
B) 10011010
C) 11101000
D) 11111000
A) 10011011
B) 10011010
C) 11101000
D) 11111000
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The binary equivalent of 122 is ____.
A) 1111010
B) 10011010
C) 11101000
D) 11111000
A) 1111010
B) 10011010
C) 11101000
D) 11111000
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
____ are simply programmer-designated names for memory locations.
A) Variables
B) Literals
C) Values
D) Keywords
A) Variables
B) Literals
C) Values
D) Keywords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____ a variable simply informs the computer that you want to associate a particular name with a particular data type.
A) Formatting
B) Instantiating
C) Interpreting
D) Declaring
A) Formatting
B) Instantiating
C) Interpreting
D) Declaring
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
The statements below are known as ____.
LastName = "Vanderkolk"
FirstName = "Monica"
HoursWorked = 40
PayRate = 15.00
GrossPay = hoursWorked * payRate
A) variables
B) assigment statements
C) statement declarations
D) literals
LastName = "Vanderkolk"
FirstName = "Monica"
HoursWorked = 40
PayRate = 15.00
GrossPay = hoursWorked * payRate
A) variables
B) assigment statements
C) statement declarations
D) literals
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The variables lastName and firstName are Strings and the variable hoursWorked is Numeric. Why would the following statements cause errors?
LastName = 10
FirstName = hoursWorked
A) String variables are being assigned literal values.
B) Numeric variables being assigned literal values.
C) The data types do not match.
D) Numeric constants are being assigned numeric values.
LastName = 10
FirstName = hoursWorked
A) String variables are being assigned literal values.
B) Numeric variables being assigned literal values.
C) The data types do not match.
D) Numeric constants are being assigned numeric values.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Constant values are ____.
A) variables
B) literals
C) identifiers
D) strings
A) variables
B) literals
C) identifiers
D) strings
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
If a string is a group of characters, it makes sense that you can make longer strings out of shorter ones by putting them together. This process is called ____.
A) concatenation
B) formatting
C) camel casing
D) validating
A) concatenation
B) formatting
C) camel casing
D) validating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
____ occurs when the program is running.
A) Data hiding
B) Camel casing
C) Runtime
D) Concatenation
A) Data hiding
B) Camel casing
C) Runtime
D) Concatenation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
The pseudocode keyword for getting input from a user is ____, followed by the variable that's receiving the value.
A) Display
B) Input
C) prompt()
D) Print
A) Display
B) Input
C) prompt()
D) Print
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Information that is sent from the computer is called ____.
A) output
B) machine language
C) pseudocode
D) input
A) output
B) machine language
C) pseudocode
D) input
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) ____ statement is often used at the beginning of a program to welcome the user.
A) Prompt
B) Input
C) Display
D) Print
A) Prompt
B) Input
C) Display
D) Print
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Every program should have ____, consistent basic documentation that includes the program's name and purpose, who wrote it, and the date it was written or modified.
A) named constants
B) literals
C) comments
D) keywords
A) named constants
B) literals
C) comments
D) keywords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
When analyzing a problem and developing an algorithm for a solution, listing the algorithm's components in the categories of input, processing, and output is helpful. This process is called ____.
A) input-processing-output
B) dual-outcome selection
C) structured programming
D) validating
A) input-processing-output
B) dual-outcome selection
C) structured programming
D) validating
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck