CSC001- Midterm Spring 97

ublkline620.GIF (83 bytes)

D. Joseph


True/False

  1. The compatibility of your computer dictates the type of software you can use and the peripheral devices that will work with your computer.
    1. T
    2. F

  2. Command-line interfaces require the user to know the correct syntax of all commands.
    1. T
    2. F

  3. When you purchase copyrighted software you become the owner of the copyright.
    1. T
    2. F

  4. Experienced users avoid formatting disks because of the danger of formatting the wrong disk and losing important information.
    1. T
    2. F

  5. Running application software directly from the multiple distribution disks each time you want to use that application is the best practice because it saves storage space on your hard drive.
    1. T
    2. F

  6. Files containing instructions that the computer carries out are categorized as programs or executable files.
    1. T
    2. F

  7. The amount of data you can store and the speed of data access depends on your storage device and the storage medium.
    1. T
    2. F

  8. Pits stamped into a CD-ROM represent bytes of data.
    1. T
    2. F

  9. When you save a modified version of a file using the same name, the old version of the file is erased and only the new version is saved on the disk.
    1. T
    2. F

  10. The data bus contains address lines and data lines.
    1. T
    2. F

  11. Shared programs require less disk space because only one copy of the program is stored on the file server, instead of one copy on each workstation.
    1. T
    2. F

  12. Sharing a program on a network means you can legally give copies of the program disk to other computer users.
    1. T
    2. F

  13. When two users edit a file on the network at the same time, most network software will save two copies of the edited file.
    1. T
    2. F

  14. It's easy to see that a computer system for sale at $1095 is a better deal that a computer system for sale at $1895.
    1. T
    2. F

  15. If you store a document on your local hard disk, other uers can generally access that document from any workstation on the network.
    1. T
    2. F


Multiple Choice

  1. What device has a keyboard and screen used for input and output but not for processing.
    1. microcomputer
    2. terminal
    3. minicomputer
    4. mainframe computer

  2. A(n) ______________ is a set of instructions that tells a computer how to perform a particular task.
    1. computer program
    2. output device
    3. control unit
    4. input device

  3. Hardware refers to the:
    1. numbers and/or graphics which may describe people, events, things, and ideas
    2. program instructions
    3. electric, electronic, and mechanical devices used for processing data
    4. data

  4. A ______________ is a peripheral device that is used to transfer data from one computer to another over the telephone lines.
    1. scanner
    2. modem
    3. plotter
    4. telephone

  5. Which one of the following statements is FALSE about peripheral devices?
    1. Peripheral devices are usually built into the main board of the computer.
    2. Peripheral devices usually require specially designed software to instruct the computer how to use them.
    3. Peripheral devices allow you to exand and modify your basic computer system.
    4. Some common examples of peripheral devices are scanners, sound cards, projectors, and modems.

  6. How many bytes are in a kilobyte?
    1. 100
    2. 1024
    3. 1 million
    4. 1 billion

  7. A legal form of protection that grants certain exclusive rights to the author or owner of a computer program is referred to as a:
    1. copy protection
    2. copyright
    3. shrink wrapping
    4. public domain

  8. Which one of the following is NOT an operating system?
    1. OS/2
    2. WordPerfect for Windows word processor
    3. UNIX
    4. DOS

  9. "John Fitz, 01345, Manager, 3/4/97" is:
    1. a data file
    2. information
    3. a batch file
    4. data

  10. Instructions that tell a computer how to perform a specific task can be stored in:
    1. the reference manual that accompanies the computer
    2. an executable file
    3. the keyboard
    4. a text file

  11. Which one of the following is a valid DOS filename?
    1. COST/BEN.XLS
    2. TAXFORM.040
    3. ANNUALRPT.DOC
    4. SAM'S Let.DOC

  12. When you purchase software and you open the sealed plastic covering the disks of CD-ROM, you are automatically bound by the software license agreement. This type of agreement is called a:
    1. copyright
    2. shrink-wrap license
    3. concurrent-use license
    4. site license

  13. How many bytes are used to represent one character?
    1. 1
    2. 2
    3. 4
    4. 8

  14. Data stored in RAM:
    1. is being processed by the computer
    2. is waiting to be processed
    3. is there for long-term storage
    4. contains the programs that start up the computer

  15. The details of the boot process might vary slightly from one computer to another, depending upon the instructions contained in:
    1. RAM
    2. ROM
    3. BIOS
    4. CMOS


Short Answer, Programming, etc.

  1. For this program, show the output the computer would print.

    A = 3.2 - 2.0 ^ 3.0 - 2.0 * (3.0 + 4.8) + 12.0 / 2.0 ^ 2.0
    PRINT A

  2. Write a BASIC statement for this arithmetic expression.

    2x2 + 7x + 1

  3. What does it mean to "run" a program in QBASIC?

  4. A "syntax error" is:
    1. the computer can't write to the floppy disk
    2. the BASIC interpreter does not understand part of the code
    3. there is not enough memory to run your program

  5. A "delimiter" in a PRINT statment is ___________________________

  6. How would you change the following program so that it runs correctly? (There are 3 errors.)

    CSL
    REM NFL Game
    LET Cowboys = 21
    LET Niners = 0
    PRINT The score of today's football game is:"
    PRINT "Cowboys", Cowboys
    PRINT "Niners, Niners

  7. What output would be produed by running the following program?

    CLS
    REM I love the NBA!
    PRINT "Spurs", "Rockets";
    PRINT "Mavericks"
    PRINT "Bulls"; "Lakers"

  8. Write a program that will: STORE each character's name and age in separate variables; and use the variables to PRINT the names and ages of all the characters.

    Wilma is 36, Pebbles is 3 and Fred is 38 years old.



  9. LET CANADATEMP.C="17"
    LET CANADATEMP.F=((9/5) * CANADATEMP.C) + "32"

    What errors would the computer notice at execution and how would you correct them?

  10. Write a short (but complete) QBASIC program which asks the user to enter a number to be divided (the dividend) and a number to divide the divide by (the divisor). After you have the two numbers, print out (to the printer) the dividend and the divisor and the result of the division (the quotient). Use the appropriate labels both in prompting and printing.

  11. What is the output of the following program?

    REM Program to print the average of 3 numbers
    CLS
    Test1 = 80
    Test2 = 90
    Test3 = 100
    Avg = (Test1 + Test2 + Test3) / 3
    PRINT Avg

  12. How does one use the author search in Eureka (be specific)?

  13. What shape is used to represent each of the following in a flow chart?

    1. START & END

    2. PROCESSING steps (assignment statements)

    3. INPUT & OUTPUT steps

  14. Draw a flow chart based on the following pseudocode:

    Begins the program
    Input 1st test score
    Input 2nd test score
    Input 3rd test score
    Calculate the average of three test scores
    Print the average
    End the program

  15. Code the program from the pseudocode and flowchart in the above problem.

  16. Given this portion of a program:

    INPUT "PLEASE ENTER A NUMBER", NUM
    IF NUM >= 0 THEN
          PRINT "THIS IS NOT A NEGATIVE NUMBER"
          IF NUM = 0 THEN
                PRINT "THIS NUMBER IS ZERO"
          END IF
    END IF
    IF NUM <0 THEN
          PRINT "THIS IS A NEGATIVE NUMBER"
    END IF

    1. 23
    2. 0


  17. What is shareware?


 

ublkline620.GIF (83 bytes)

Return to:  CSUS | Computer Science

October 9, 1998
Comments to:  josephd@csus.edu