Introduction to Computer Science Pre-Test Questions - 849 Verified Questions

Page 1


Introduction to Computer Science

Pre-Test Questions

Course Introduction

Introduction to Computer Science provides students with a foundational understanding of computational thinking, problem-solving, and the essential concepts underlying modern computer systems. The course covers topics such as algorithms, programming basics, data structures, software development, hardware components, networking fundamentals, and the social and ethical implications of technology. Through a combination of theoretical knowledge and hands-on programming exercises, students will develop the skills necessary to analyze problems, design efficient solutions, and understand the impact of computing in various domains. This course serves as a gateway for further study in computer science and related fields.

Recommended Textbook

Invitation to Computer Science 6th Edition by G.Michael Schneider

Available Study Resources on Quizplus

17 Chapters

849 Verified Questions

849 Flashcards

Source URL: https://quizplus.com/study-set/1994 Page 2

Chapter 1: An Introduction to Computer Science

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39624

Sample Questions

Q1) All conceivable problems can be solved algorithmically.

A)True

B)False

Answer: False

Q2) ____ is one of the most common applications of computers.

A) Searching a list

B) Running a company

C) Writing a program

D) Generating a list of all the prime numbers

Answer: A

Q3) What is wrong with the following algorithm?

1) Set X to be 1

2) Increment X

3) Print X

4) If X > 0, repeat from 2

A) It does not produce a result.

B) It is ambiguous.

C) It does not halt in a finite amount of time.

D) It is not well-ordered.

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Algorithm Discovery and Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39625

Sample Questions

Q1) The selection of an algorithm to solve a problem is greatly influenced by the way the input ____ for that problem are organized.

A) words

B) data

C) solutions

D) pseudocode

Answer: B

Q2) The use of <u>high-level</u> instructions during the design process is an example of abstraction. _________________________

A)True

B)False

Answer: True

Q3) In a(n) ____________________ loop, it is possible for the loop body to never be executed.

Answer: pretest

Q4) What is pattern matching?

Answer: Pattern matching is the process of searching for a special pattern of symbols within a larger collection of information.

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: The Efficiency of Algorithms

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39626

Sample Questions

Q1) ____ are useful for rating one machine against another and for rating how sensitive a particular algorithm is with respect to variations in input on one particular machine.

A) Time trials

B) Benchmarks

C) Comparison times

D) Intensive tests

Answer: B

Q2) Binary search uses significantly more space than sequential search.

A)True

B)False

Answer: False

Q3) Selection sort is a(n) ____ algorithm in all cases.

A) Q(1)

B) Q(n)

C) Q(2n)

D) Q(n2)

Answer: D

Q4) What is the logarithm of n to the base 2?

Answer: The number of times a number n can be cut in half and not go below 1

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Building Blocks: Binary Numbers, Boolean

Logic, and Gates

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39627

Sample Questions

Q1) The emitter and collector are the two input lines of a transistor.

A)True

B)False

Q2) Explain what an arithmetic overflow is and what its significance in computer science is.

Q3) A(n) ____________________ is an error condition that occurs when an operation in a computer produces an integer that exceeds the maximum allowable value.

Q4) ASCII mapping is the process of assigning a printable letter in our alphabet a unique number.

A)True

B)False

Q5) Describe at length what a multiplexor is.

Q6) The sum-of-products algorithm always produces an optimal circuit.

A)True

B)False

Q7) ____________________ is the highness or lowness of a sound.

Q8) Sequential circuits contain ____________________ loops.

Q9) What is sampling? Page 6

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 5: Computer Systems Organization

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39628

Sample Questions

Q1) The ____ operation in Von Neumann machines uses a special set of bits known as condition codes.

A) compare

B) addition

C) control

D) looping

Q2) The set of all operations that can be executed by a processor is called its I/O set.

A)True

B)False

Q3) Registers can be accessed much more quickly than random access memory.

A)True

B)False

Q4) There are ____ bytes in a gigabyte.

A) 210

B) 220

C) 230

D) 2100

Q5) In a direct access storage device, every unit of information has a unique

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: An Introduction to System Software and Virtual Machines

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39629

Sample Questions

Q1) A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed

B) virtual C) assembler

D) naked

Q2) What is the most important task of the operating system?

Q3) Machine language allows only numeric memory addresses.

A)True

B)False

Q4) It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.

Q5) An interface prevents accidental damage to hardware, programs, and data. A)True

B)False

Q6) The variable used to determine the address of a given instruction or piece of data is called the <u>program</u> counter. _________________________ A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Computer Networks, The Internet, and the World Wide Web

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39630

Sample Questions

Q1) In the ____________________ topology all nodes are connected to a single shared communication line.

Q2) What are the two critical responsibilities of the Network layer?

Q3) A(n) ____________________ is a "smarter" device that has knowledge about the nodes located on each separate network.

Q4) A ____ uses the same wires that carry regular telephone signals into your home.

A) digital subscriber line

B) digital subscription link

C) digital standard line

D) digital standard link

Q5) Why were WANs first studied?

Q6) ____ are systems that create communities of users who share common interests and activities and which provide multiple methods of online interaction.

A) Bulletin boards

B) Newsgroups

C) Chat rooms

D) Social networks

Q7) What is a protocol stack?

Page 10

Q8) The individual computers on the network are referred to as

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 8: Information Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39631

Sample Questions

Q1) ____ verifies who has the right to gain access to the computer, whether it is your local machine or the Web server.

A) Authorization

B) Authentication

C) Access

D) Encryption

Q2) The ____ maintains a file of user IDs and corresponding passwords.

A) switch

B) router

C) operating system

D) firewall

Q3) A(n) <u>Trojan horse</u> embeds itself within another program or file and when that program or file is activated, it copies itself and attacks other files on the system.

A)True

B)False

Q4) SSL protocols are the only protocols that are supported by all Web browsers.

A)True

B)False

Q5) What is the definition of phishing?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 9: Introduction to High-Level Language Programming

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39632

Sample Questions

Q1) The problem identification document commits the final and complete problem specification to paper and guides the software developers in all subsequent decisions.

A)True

B)False

Q2) Ada, Java, C++ and C# require a ____ to terminate an executable program statement.

A) semicolon

B) period

C) blank space

D) comma

Q3) In assembly language, the programmer need not manage the details of the movement of data items within memory.

A)True

B)False

Q4) Assembly language programs are ____ specific.

A) language

B) compiler

C) architecture

D) machine

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 10: The Tower of Babel

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39633

Sample Questions

Q1) Is recursion the major argument for using a functional language? If not, what is?

Q2) ____ was originally designed for systems programming, in particular for writing the operating system UNIX.

A) COBOL

B) C

C) Python

D) Java

Q3) ____ was the first high-level programming language actually implemented.

A) COBOL

B) BASIC

C) PL-1

D) FORTRAN

Q4) Patterned after the human brain, ____ can involve massive interconnections of many extremely simple devices.

A) neural networks

B) kinetic networks

C) biometric networks

D) psychometric networks

Q5) Of what does programming in a procedural language consist?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 11: Compilers and Language Translation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39634

Sample Questions

Q1) During parsing, a compiler deals only with the ____ of a statement.

A) semantics

B) syntax

C) grammar

D) rules

Q2) <u>Parsing</u> is the first phase of the compilation process.

A)True

B)False

Q3) Present what each individual BNF rule looks like, and briefly explain its components.

Q4) A(n) ____ is a compiler embedded with a collection of supporting software.

A) debugger

B) reusable code library

C) visual development library

D) integrated development environment

Q5) One of the possible local ____________________ is eliminating unnecessary operations.

Q6) Explain what metasymbols are and discuss their use as part of BNF rules.

Q7) Explain what the goal in compiler design today is.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Models of Computation

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/39635

Sample Questions

Q1) At any point in time, only a finite number of cells in the Turing machine input contain ____ symbols.

A) blank

B) placeholder

C) alphabetic

D) nonblank

Q2) A formal basis for mathematical proofs guarantees the presence of intuitive statements.

A)True

B)False

Q3) We can write a Turing machine to add 1 to any number; such a machine is often called a(n) ____.

A) unary operator

B) bit adder

C) parity machine

D) incrementer

Q4) The bit inverter Turing machine should have <u>two states</u>.

A)True B)False

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Simulation and Modeling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39636

Sample Questions

Q1) It is possible to discover the same features displayed in a graph from a textual representation of the output of a model, but it would probably take much more time.

A)True

B)False

Q2) ____ consists of looking for ways to convert the data to other forms or to different units that will make the display easier to understand and interpret.

A) Data distribution

B) Data analysis

C) Data interpretation

D) Data manipulation

Q3) When we process an event, we change the ____ of the simulated system in the same way that the actual system would change if this event had occurred in real life.

A) event

B) parameter

C) condition

D) state

Q4) What happens in a simulated system when we process an event?

Q5) What is the difference between computer graphics and scientific visualization?

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 14: Electronic Commerce and Databases

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39637

Sample Questions

Q1) Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones.

A)True

B)False

Q2) List four risks (in the form of questions to consider) that may be involved with the decision to move into e-commerce?

Q3) Briefly, what are the goals of establishing an online shopping/e-commerce presence?

Q4) Opening an online store requires less planning than building another physical store location.

A)True

B)False

Q5) You maintain a ____ Web presence to streamline transactions between you as the seller and other businesses as buyers.

A) B2B

B) S2B

C) B2S

D) C2B

Q6) Explain what Craigslist is and how it works.

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Artificial Intelligence

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39638

Sample Questions

Q1) A(n) ____ attempts to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion.

A) inference engine

B) back propagation system

C) intelligent agent

D) rule-based system

Q2) ____ begins with assertions and tries to match those assertions to the "if" clauses of rules.

A) Decision making

B) Backward chaining

C) Knowledge engineering

D) Forward chaining

Q3) A(n) ____ contains facts about a specific subject domain to narrow the scope to a manageable size.

A) explanation facility

B) modus ponens

C) knowledge base

D) intelligent agent

Q4) Provide at least three examples of an intelligent agent.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 16: Computer Graphics and Entertainment: Movies, Games,

and Virtual Communities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39639

Sample Questions

Q1) On March 31, 1952, Remington Rand delivered its first machine to the ____.

A) U.S. Army

B) U.S. Census Bureau

C) Atomic Energy Commission

D) General Electric

Q2) The <u>server</u> software that creates the MMOG world is always running and always available, and it always remembers the current state of every player.

A)True

B)False

Q3) List at least three of the technical problems that must be solved by the designers of MMOGs.

Q4) What is the operative principal in producing video game images?

Q5) The sequence of operations that must be completed successfully to produce a realistic three-dimensional image sequence is termed the ____.

A) graphics streamline

B) graphics pipeline

C) graphics mode

D) graphics perspective

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 17: Making Decisions About Computers,

Information, and Society

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39640

Sample Questions

Q1) In ____, the Fraunhofer Institute patented MP3 in Germany, and a few years later MP3 became an international standard.

A) 1989

B) 1999

C) 2000

D) 2002

Q2) What are two of these major leaks in which WikiLeaks has been involved?

Q3) Social ____ are people who raise important, but irritating, questions about society.

A) gadflies

B) gadabouts

C) hackers

D) dialectics

Q4) The philosopher ____ was known to say "never treat a fellow human merely as a means to an end."

A) Descartes

B) Turing

C) Aristotle

D) Kant

Q5) Explain what sexting is.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.