CSC001- Final Exam Spring 98

ublkline620.GIF (83 bytes)

D. Joseph

Answer questions 1 through 30 on your Scantron form.
Questions 1 - 25 are T/F (2 points each).
Questions 26 - 50 are Multiple Choice (3 pts each).
Questions 51 - 75 are a mixture of short answer, fill-ins, programming, etc. Answer these questions in the test booklet. (Show all work and remember to write legibly!)

True/False (2 points each)

  1. Every Internet host computer has a unique numeric address called an IP address.
  1. True
  2. False
  1. Document production software includes word-processing programs, spreadsheet programs, and database programs.
  1. True
  2. False
  1. Disk compression and file compression are the same.
  1. True
  2. False
  1. Keyword search engines allow the user to enter words or phrases to be found in the search database.
  1. True
  2. False
  1. A momentary flicker of the lights in a room could be enough of a power interruption to lose all the data held in RAM.
  1. True
  2. False
  1. An HTML document consists of two parts, the head and the tail.
  1. True
  2. False
  1. A computer program that enters a computer attached to a file and begins to reproduce itself when the file is run is a time bomb.
  1. True
  2. False
  1. Single user licenses limit the use of the software to one specific individual at one location at a time.
  1. True
  2. False
  1. The four subcategories of system software are operating systems, utilities, device drivers, and word-processing programs.
  1. True
  2. False
  1. Data files are considered to be passive because they do not by themselves cause the computer to perform any tasks.
  1. True
  2. False
  1. A modem can be contained on a PCMCIA card.
  1. True
  2. False
  1. More disk space can be made available on a disk drive by erasing files that are no longer needed.
  1. True
  2. False
  1. When using a spreadsheet package, like Microsoft Excel, when a formula is entered into a cell, the cell displays the formula results, not the formula itself.
  1. True
  2. False
  1. Every character on disk storage or in memory requires one byte of space.
  1. True
  2. False
  1. I/O refers to the process of retrieving data to be processed and sending processed data to a disk, printer, or display device.
  1. True
  2. False
  1. In order to use a compressed file, you must often uncompress, extract, or expand the file to restore it to its original form.
  1. True
  2. False
  1. Algorithm is another term for a computer program.
  1. True
  2. False
  1. A computer requires two floppy drives to perform a floppy disk to floppy disk copy.
  1. True
  2. False
  1. A passive matrix display has superior quality to an active matrix display.
  1. True
  2. False
  1. A major upgrade to a software program is normally indicated by a new version number.
  1. True
  2. False
  1. Mapping is the process of assigning a drive letter to a server's hard drive so it may be used by a workstation.
  1. True
  2. False
  1. When a hard disk fails, all of the data on the disk may be lost.
  1. True
  2. False
  1. Command-line, GUI, and menu-driven are all types of user interfaces.
  1. True
  2. False
  1. A "bug" is an error in a program.
  1. True
  2. False
  1. Anti-virus software cannot fully protect your computer unless the software is kept up to date.
  1. True
  2. False

Multiple Choice (3 points each)

  1. The Internet is a widespread collection of computer __________________ linked together to exhange data and information.
  1. databases
  2. peripherals
  3. networks
  4. chat-rooms
  1. A file that might appear to be a video game but is in reality formatting a disk drive without the user's knowledge is an example of a(n)
  1. Trojan horse
  2. mirage
  3. distracter
  4. illusion
  1. An integrated circuit is a slice of ____________ containing wires, capacitors, and transistors.
  1. titanium
  2. magnesium
  3. silicon
  4. crystal
  1. When an operating system is defined as downward compatible, it means
  1. it will run programs designed for earlier versions of the operating system but not for later versions.
  2. it will run only programs designed for the current operating system.
  3. it will run programs designed for earlier or later versions of the operating system.
  4. none of the above.
  1. A mechanical apparatus that reads and writes data to some storage medium is known as a storage _________________
  1. device
  2. container
  3. scheduler
  4. driver
  1. A UPS is a device that contains a(n) ________________ and special circuitry to provide continuous power to a computer.
  1. Generator
  2. Chemical reactor
  3. Battery
  4. Alternator
  1. All computers that connect to the Internet must follow a standard communications protocol called
  1. ARPANET
  2. HTTP/FTP
  3. TCP/IP
  4. NSP
  1. During a network log on process, the workstation's parallel port is _______________ by the server.
  1. shut down
  2. captured
  3. renamed
  4. none of the above
  1. The maximum amount of data that can be held by any storage medium is the storage _____________
  1. access time
  2. density
  3. capacity
  4. load limit
  1. An important step in creating a backup copy of a disk drive is to:
  1. run virus scan software on the drive to be backed up before starting the backup.
  2. store the backup in a secure place away from the computer itself.
  3. test the backup to be sure it can be restored if needed.
  4. all of the above.
  1. A shrink-wrap license is a(n) _________________ approach to licensing.
  1. questionable
  2. take it or leave it
  3. mail in contract
  4. none of the above
  1. CD-ROM stands for:
  1. Computer disc read optical medium
  2. Computer disc random optical medium
  3. Compact disc random optical memory
  4. Compact disc read only memory
  1. A computer cannot be connected to a network unless the computer contains a _____________, commonly called a NIC.
  1. Novell interface card
  2. network installation card
  3. network interface card
  4. network installation communicator
  1. Many modern operating systems use an area of the hard disk to supplement RAM memory. The area is called _______________
  1. a disk cache
  2. CMOS
  3. virtual memory
  4. external memory
  1. When a computer is turned on, it begins a start-up procedure called the
  1. boot process
  2. system configuration
  3. start cycle
  4. system launch
  1. What are two forms in which sound or audio can be represented?
  1. MIDI music or bitmap audio
  2. waveform or bitmap audio
  3. waveform or MIDI music
  4. vector or MIDI music
  1. The number of pixels a monitor is configured to display determines the monitor's _______________
  1. dot pitch
  2. resolution
  3. image depth
  4. screen size
  1. Which of the following file extensions tells you that the file is NOT compressed?
  1. .tif
  2. .bas
  3. .zip
  4. .jpg
  1. The systematic approach to the development, operation, maintenance, and retirement of software is:
  1. computer operations
  2. database management
  3. software engineering
  4. none of the above
  1. Read-only memory, unlike RAM, is:
  1. reusable
  2. permanent
  3. low speed
  4. high speed
  1. Laser printers create images by fusing ____________ to the paper's surface.
  1. Carbon
  2. Ink
  3. Toner
  4. Charcoal
  1. Multiple users on a network using the same program at the same time is called ____________
  1. sharing
  2. multitasking
  3. a split resource
  4. concurrency
  1. The signals for a wireless network may be sent by
  1. microwave
  2. infrared technology
  3. radio waves
  4. all of the above
  1. A duplicate copy of a file or the contents of a disk drive that can be used to restore data that has been accidentally or intentionally damaged is a ________________
  1. mirrored copy
  2. backup
  3. fail-safe version
  4. log file
  1. Files sitting in a print queue are known as ___________________
  1. print lines
  2. pending steps
  3. inactive resources
  4. print jobs

 

Short answer, fill-ins, and programming

Please answer questions 51 through 75 in this test booklet.

 

  1. (3 pts) Eureka is the name of the system that the CSUS library keeps its electronic card catalog on. It is accessible to the entire campus community; is it accessible to the Internet in general as well? ________
  2.  

     

  3. (4 pts) Explain the specific benefits to writing great code with remarks and great variable names.
  4.  

     

  5. (4 pts) For this program show the output the computer would produce:
  6. PRINT 2 * ( 2 * 4 / ( 2 / 2 ) / ( 2 * 2 ) ) ^ 2 * 3

     

     

  7. (4 pts) Write an acceptable QBASIC expression for this arithmetic expression:
  8. a d + e g
    ------ + ------- + -----

    b + c f h

     

  9. (4 pts) Convert the following binary (base 2) number to a decimal (base 10) number:
  10. 10011.1101 = ________________

     

  11. (4 pts) Convert the following decimal (base 10) number to a binary (base 2) number:
  12. 82.4 = _______________

     

  13. (4 pts) How many bytes of memory are needed to store "Have a great summer!" (not including the quotation marks)?
  14. ____________________ byte(s)

     

  15. (4 pts) For the following problem state whether the error in the following QBASIC code is a syntax error, run-time error, or logic error:
  16. IF score <= 60 THEN PRINT "You failed"

    IF score > 59 THEN PRINT "You pass"

    Type of error _____________________________________________________

     

     

  17. (6 pts) Name three computer peripheral devices.
  18.  

  19. (6 pts) Given:
  20. cls
    first = 10
    last = 20
    sum=0
    while first < last

    first = first + 4
    sum = sum + 3

    print sum
    wend

    What is the output?

     

  21. (4 pts) What is the function of a floppy disk drive?
  22.  

     

  23. (3 pts) Is there a fan inside the computer's case? ______________
  24.  

     

  25. (3 pts) Arrays are useful in managing large amounts of ________________ .
  26.  

     

  27. (4 pts) In all, the following two lines create ____________ variables.
  28. DIM Number(23 TO 33)
    DIM Name$(1 TO 4)

     

  29. (6 pts) After running the following program, the number stored in Mail(7) is ____________?
  30. CLS
    DIM Mail(1 TO 10)
    Mail(7) = 0
    Mail(10) = 0
    Mail(4) = 50
    Mail(6) = Mail(7) + Mail(4)
    Mail(8) = 100
    Mail(2) = Mail(7) + Mail(4) + Mail(10)
    Mail(10) = 150
    Mail(7) = Mail(6) + Mail(8) + Mail(2)
    Mail(2) = 200

     

     

  31. (4 pts) Any Internet resource that you can view in a Web browser has an associated URL, which is
    short for ___________________________________________
  32.  

     

  33. (4 pts) A Web browser uses the _____________ tags in a file to display a Web page.
  34.  

     

  35. (6 pts) Write up a short program, which creates an array with 15 character variables and then uses a loop to prompt the user to enter values to fill in these variables.
  36.  

     

     

  37. (6 pts) What value will the variable T hold at the end of the following code? ____________
  38. T = 0

    FOR J = 1 TO 10

    T = T + 1

    FOR N = 1 TO 5

    T = T + 2

    NEXT N

    NEXT J

     

  39. (6 pts) Finish the following code to add the numbers from 10 to 20 using a loop.
  40. LET SUM = ________

    FOR COUNT = __________________________

    _______________________________________

    _______________________________________

    _______________________________________

    PRINT SUM

     

     

  41. (6 pts) Draw a flowchart for a program, which has the user input a number and adds that number to itself 6 times and prints the answer.
  42.  

     

  43. (8 pts) Write a program which has the user input three test scores. Have the program print the largest score.
  44.  

     

     

  45. (6 pts) What is wrong with the logic of the following IF statement?
  46. IF (score >= 85) OR (score <= 100) THEN

    grade = "A"

    END IF

    IF (score >= 75) OR (score <= 84) THEN

    grade = "B"

    END IF

    .

    . (etc)

    .

     

  47. (8 pts) Each line of the data file, COMPANY.DAT, contains the following data: company name, revenue (in millions of dollars), number of employees, the company's 1992 ranking, and the company's 1997 ranking (both based on revenue):
  48. IBM,78508,240615,1,1
    H-P,42895,112000,2,2
    DEC,13046,54900,3,5
    Microsoft,11358,22232,NA,6
    Compaq,24584,18900,NA,4
    Apple,7081,10176,5,NA
    Unisys,6636,32900,4,NA
    Intel,25070,48500,NA,3

    Show what will be displayed in the output window after the following code executes.

    DataLine$ ="$##,###(M)"

    OPEN "company.dat" FOR INPUT AS #1

    INPUT #1, Company$, Revenue, Employees, Rank92$, Rank97$

    WHILE Rank97$ <> "3"

    INPUT #1, Company$, Revenue, Employees, Rank92$, Rank97$

    WEND

    CLOSE #1

    PRINT "Company: "; Company$

    PRINT "Revenue: ";

    PRINT USING DataLine$; Revenue

     

  49. (8 pts) Write a program that inputs two numbers from the user and then calls a subroutine to calculate the sum of the two numbers. The main program must then print the sum. (You need to write the main program and the subroutine.)

 

  

 

ublkline620.GIF (83 bytes)

Return to:  CSUS | Computer Science

December 7, 1998
Comments to:  josephd@csus.edu