Name: __________________________ Date: _____________



1.
Which problem-solving technique involves defining the beginning and ending states of a problem, then comparing different methods for getting between the states?
A.
divide and conquer
B.
means-ends analysis
C.
solving by analogy
D.
the building-block approach
E.
merging solutions


2.
True or False? All computer viruses are destructive to computer resources.
A. True
B. False


3.
The following series of steps is not an algorithm. How would you correct it?
 
Putting on a Pair of Athletic Shoes
 
Step 1. Put on one shoe.
 
Step 2. Tie the laces.
 
Step 3. Repeat.
 
A.
Exchange steps 1 and 2.
B.
Exchange steps 2 and 3.
C.
Change step 3 to "Repeat once."
D.
Change step 1 to "Put on both shoes."


4.
True or False? Magnetic tape drives and floppy disk drives are examples of auxiliary (secondary) storage devices.
A. True
B. False


5.
True or False? A computer game is an example of interactive, not batch, processing.
A. True
B. False


6.
True or False? A computing professional has a responsibility not to engage in software piracy and prevent it from occurring.
A. True
B. False


7.
Of the following components of a computer, which one stores data and instructions?
A.
input device
B.
output device
C.
arithmetic/logic unit
D.
control unit
E.
memory unit


8.
Which one of the following is not one of the three major phases in the life cycle of a computer program?
A.
the problem-solving phase
B.
the management phase
C.
the implementation phase
D.
the maintenance phase


9.
Which of the following most closely resembles human language?
A.
a high-level language
B.
a machine language
C.
an assembly language


10.
True or False? The two components of the central processing unit (CPU) are the arithmetic/logic unit and the control unit.
A. True
B. False


11.
Which of the following is the second step in the implementation phase of a computer program's life cycle?
A.
Translate the general solution into code.
B.
Write a general solution for the problem.
C.
Test the general solution.
D.
Analyze the problem.
E.
Test the solution on a computer.


12.
Which of the following is NOT an example of a computer programmer taking a step to guard confidential computer data?
A.
shredding computer printouts
B.
keeping backup copies in a locked cabinet
C.
using passwords that are difficult to keep
D.
implementing file encryption
E.
utilizing malware to protect confidential computer data from being stolen.


13.
Which of the following terms describes the repetition of statements (instructions) while certain conditions are met?
A.
sequence
B.
selection
C.
looping
D.
subprogram


14.
Which of the following terms describes the execution of a series of statements (instructions) one after another?
A.
sequence
B.
selection
C.
looping
D.
subprogram


15.
Of the following components of a computer, which one fetches the next instruction from RAM during program execution?
A.
input device
B.
auxiliary storage device
C.
arithmetic/logic unit
D.
control unit
E.
memory unit


16.
____________________ is the language made up of binary-coded instructions that are used directly by the computer.

Answer:


17.
A(n) ____________________ exploits gaps in a computer's security, hijacking it to search the Internet for other computers with similar gaps.

Answer:


18.
In the "____________________" problem-solving technique, you recognize any subtasks that have been solved before and use those as solutions to part of the problem.

Answer:


19.
Modifications are made to an existing computer program during the ____________________ phase of the program's life cycle.

Answer:


20.
In the "____________________" problem-solving technique, you define the beginning and ending states of the problem, then compare different methods for getting between them.

Answer:



STOP This is the end of the test. When you have completed all the questions and reviewed your answers, press the button below to grade the test.