Deck 1: Introduction to Computers and Java
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 1: Introduction to Computers and Java
1
In the programming process which of the following is not involved in defining what the program is to do:
A) Process
B) Compile code
C) Input
D) Output
E) Purpose
A) Process
B) Compile code
C) Input
D) Output
E) Purpose
B
2
____________ results in only the object's methods being able to directly access and make the changes to the object's data.
A) Component reusability
B) Classes
C) Data hiding
D) Procedures
A) Component reusability
B) Classes
C) Data hiding
D) Procedures
C
3
The purpose of validating the results of the program is:
A) To create a model of the program
B) To correct syntax errors
C) To correct runtime errors
D) To determine whether the program solves the original problem
A) To create a model of the program
B) To correct syntax errors
C) To correct runtime errors
D) To determine whether the program solves the original problem
D
4
Byte code instructions are:
A) Another name for source code
B) Syntax errors
C) Machine code instructions
D) Read and interpreted by the JVM
A) Another name for source code
B) Syntax errors
C) Machine code instructions
D) Read and interpreted by the JVM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Variables are:
A) Symbolic names made up by the programmer that represents locations in the computer's RAM
B) Reserved words
C) Symbolic names made up by the programmer whose values cannot be changed
D) Operators that perform operations on one or more operands
A) Symbolic names made up by the programmer that represents locations in the computer's RAM
B) Reserved words
C) Symbolic names made up by the programmer whose values cannot be changed
D) Operators that perform operations on one or more operands
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
RAM is usually:
A) A static type of memory,used for permanent storage
B) A volatile type of memory,used only for temporary storage
C) Secondary storage
D) An input/output device
A) A static type of memory,used for permanent storage
B) A volatile type of memory,used only for temporary storage
C) Secondary storage
D) An input/output device
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Internally,the central processing unit (CPU)consists of two parts:
A) The control unit and the arithmetic and logic unit (ALU)
B) The control unit and main memory
C) The arithmetic and login unit (ALU)and main memory
D) The input and output devices
A) The control unit and the arithmetic and logic unit (ALU)
B) The control unit and main memory
C) The arithmetic and login unit (ALU)and main memory
D) The input and output devices
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A byte is a collection of:
A) Four bits
B) Six bits
C) Eight bits
D) A dollar
A) Four bits
B) Six bits
C) Eight bits
D) A dollar
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Computers can do many different jobs because they are:
A) Electronic
B) Programmable
C) Hardware
D) Software
A) Electronic
B) Programmable
C) Hardware
D) Software
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
This is a special language used to write computer programs.
A) Programming language
B) Operating system
C) Application
D) Pseudocode
A) Programming language
B) Operating system
C) Application
D) Pseudocode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The original name for Java was
A) Java
B) HotJava
C) Elm
D) Oak
A) Java
B) HotJava
C) Elm
D) Oak
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
One of the design tools used by programmers when creating a model of the program is:
A) Disk drive
B) Compiler
C) ALU
D) Pseudocode
A) Disk drive
B) Compiler
C) ALU
D) Pseudocode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Another term for programs is :
A) Hardware
B) Software
C) Firmware
D) Peopleware
A) Hardware
B) Software
C) Firmware
D) Peopleware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
An operating system can be categorized according to:
A) The number of users they can accommodate
B) The number of tasks they can perform at one time
C) Both of the above
D) Neither of the above
A) The number of users they can accommodate
B) The number of tasks they can perform at one time
C) Both of the above
D) Neither of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The major components of a typical computer system consist of:
A) The CPU
B) Input/output devices
C) Main memory
D) Secondary storage devices
E) All of the above
A) The CPU
B) Input/output devices
C) Main memory
D) Secondary storage devices
E) All of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Software refers to:
A) The physical components that a computer is made of.
B) Firmware
C) Programs
D) Peopleware
A) The physical components that a computer is made of.
B) Firmware
C) Programs
D) Peopleware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A runtime error is usually the result of:
A) A logical error
B) A syntax error
C) A compilation error
D) Bad data
A) A logical error
B) A syntax error
C) A compilation error
D) Bad data
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
This is a software entity that contains data and procedures.
A) Method
B) Object
C) Class
D) Program
A) Method
B) Object
C) Class
D) Program
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Syntax is:
A) Words that have a special meaning in the programming language
B) Rules that must be followed when writing a program
C) Punctuation
D) Symbols or words that perform operations
A) Words that have a special meaning in the programming language
B) Rules that must be followed when writing a program
C) Punctuation
D) Symbols or words that perform operations
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Suppose you are at an operating system command line,and you are going to use the following command to compile a program: javac MyClass.java
Before entering the command,you must:
A) Save the program with the .comp extension
B) Execute the java.sun.com program
C) Make sure you are in the same directory or folder where MyClass.java is located
D) Close all other Windows on your computer system
Before entering the command,you must:
A) Save the program with the .comp extension
B) Execute the java.sun.com program
C) Make sure you are in the same directory or folder where MyClass.java is located
D) Close all other Windows on your computer system
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Encapsulation refers t the combining of data and code into a single object.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Logical errors are mistakes that cause the program to produce erroneous results.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Application software refers to:
A) The operating system
B) Pseudocode
C) Key words
D) The programs that make the computer useful to the user
A) The operating system
B) Pseudocode
C) Key words
D) The programs that make the computer useful to the user
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
This is a set of programming language statements that,together,perform a specific task.
A) Object
B) Compiler
C) Procedure
D) Pseudocode
A) Object
B) Compiler
C) Procedure
D) Pseudocode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Java was developed by
A) Microsoft.
B) IBM
C) Sun Microsystems
D) Hewlett-Packard
A) Microsoft.
B) IBM
C) Sun Microsystems
D) Hewlett-Packard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Each byte is assigned a unique number known as an address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Colons are used to indicate the end of a Java statement.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
The data contained in an object is known as:
A) Methods
B) Attributes
C) Classes
D) Atriums
A) Methods
B) Attributes
C) Classes
D) Atriums
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following will compile a program called ReadIt?
A) java ReadIt.java
B) java ReadIt.javac
C) javac ReadIt.java
D) javac ReadIt.javac
A) java ReadIt.java
B) java ReadIt.javac
C) javac ReadIt.java
D) javac ReadIt.javac
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
This is a cross between human language and a programming language.
A) Pseudocode
B) Java
C) The Java Virtual Machine
D) The compiler
A) Pseudocode
B) Java
C) The Java Virtual Machine
D) The compiler
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Because Java byte code is the same on all computers,compiled Java programs
A) Must be re-compiled for each different machine it is run on
B) Cannot run on Linux systems
C) Are non-existent
D) Are highly portable
A) Must be re-compiled for each different machine it is run on
B) Cannot run on Linux systems
C) Are non-existent
D) Are highly portable
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Application software refers to programs that make the computer useful to the user.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following will run the compiled program ReadIt?
A) java ReadIt.java
B) java ReadIt
C) run ReadIt
D) go ReadIt
A) java ReadIt.java
B) java ReadIt
C) run ReadIt
D) go ReadIt
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Key words are:
A) The data names in your program
B) Words that have a special meaning in the programming language
C) Symbols or words that perform operations on one or more operands
D) Words or names defined by the programmer
A) The data names in your program
B) Words that have a special meaning in the programming language
C) Symbols or words that perform operations on one or more operands
D) Words or names defined by the programmer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
These are used to indicate the end of a Java statement.
A) Semicolons
B) Colons
C) Periods
D) Asterisks
A) Semicolons
B) Colons
C) Periods
D) Asterisks
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not part of the programming process?
A) Design
B) Testing
C) Debugging
D) All the above are parts of the programming process
A) Design
B) Testing
C) Debugging
D) All the above are parts of the programming process
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
When an object's internal data is hidden from outside code and access to that data is restricted to the object's methods,the data is protected from accidental corruption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A computer program is:
A) A set of instructions that enable the computer to solve a problem or perform a task.
B) Main memory
C) Pseudocode
D) A flow chart
A) A set of instructions that enable the computer to solve a problem or perform a task.
B) Main memory
C) Pseudocode
D) A flow chart
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
The contents of a variable cannot be changed while the program is running.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Compiled byte code is also called source code.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Java source files end with the .class extension.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck