Computer - Test Bank
Latest uploads at Computer - Test Bank. Looking for notes at Computer - Test Bank? We have lots of notes, study guides and revision notes available for your school.
-
9
- 0
- 0
Courses at Computer - Test Bank
Notes available for the following courses at Computer - Test Bank
Latest notes & summaries Computer - Test Bank
Chapter 3: Using Classes and Objects 
 
Multiple Choice Questions: 
 
1) The ________________ operator is used to instantiate an object. 
 
		a) static 
		b) new 
		c) + 
		d) - 
		e) none of the above 
 
	Answer: b 
	Explanation: The new operator instantiates an object. There is no static operator, and the + and – operators are for arithmetic expressions (although the + operator can also be used for String concatenation). 
 
2) A special method that is invoked to set up an object du...
Chapter 03 
Operational/Organizational Security 
 
 
 Multiple Choice Questions 
1. (p. 51) Statements made by management that lays out the organization's position on an issue are called ________. A. policies B. procedures C. standards D. guidelines 
 
 Difficulty: Easy 
2. (p. 51) Your boss needs instructions explaining the steps of how to send encrypted email properly for all employees. You will need to create the _________. A. policy B. proced...
Tutorial 3: Designing a Web Page with CSS 
 
TRUE/FALSE 
 
	1.	To render a document, the device displaying the page needs a style sheet that specifies the appearance of each page element. 
 
ANS:	T	PTS:	1	REF:	HTML 142 
 
	2.	In every version of CSS, you apply a style rule containing a list of style properties to an 
element or a group of elements known as a selector. 
 
ANS:	T	PTS:	1	REF:	HTML 144 
 
	3.	One advantage of user-defined style sheets is that they make the Web more accessible to vis...
Student: ___________________________________________________________________________ 
1. This type of software works with end users, application software, and computer hardware to handle the majority of technical details. 
A. Communications 
B. Application 
C. Utility D. System 
2. This type of software can be described as end user software and is used to accomplish a variety of tasks. 
A. Communications B. Application 
C. Utility 
D. System 
3. _______ provide additional information and request...
Tutorial 3: Designing a Web Page with CSS 
 
TRUE/FALSE 
 
	1.	To render a document, the device displaying the page needs a style sheet that specifies the appearance of each page element. 
 
ANS:	T	PTS:	1	REF:	HTML 142 
 
	2.	In every version of CSS, you apply a style rule containing a list of style properties to an 
element or a group of elements known as a selector. 
 
ANS:	T	PTS:	1	REF:	HTML 144 
 
	3.	One advantage of user-defined style sheets is that they make the Web more accessible to vis...
Computers Are Your Future, 12e (LaBerta) 
Chapter 2 Inside the System Unit 
 
1) A byte: 
A) is the equivalent of eight binary digits. 
B) represents one digit in the decimal numbering system. 
C) is the smallest unit of information that a computer can process. 
D) can be compared to the state of one light switch being either on or off. 
Answer: A 
Diff: 2 
Reference: Representing Data as Bits and Bytes 
 
2) Computers count with ________ numbers. 
A) regular 
B) binary 
C) decimal 
D) digita...
Chapter 2 – Cryptographic Tools 
 
TRUE/FALSE QUESTIONS: 
 
T	F	1. Symmetric encryption is used primarily to provide confidentiality. 
T	F	2. Two of the most important applications of public-key encryption are 
 digital signatures and key management. 
 
T	F	3. Cryptanalytic attacks try every possible key on a piece of ciphertext 
 until an intelligible translation into plaintext is obtained. 
 
T 	F	4. The secret key is input to the encryption algorithm. 
 
T	F	5. Triple DES tak...
Chapter 1 – Computer Systems Overview 
 
TRUE/FALSE QUESTIONS: 
T	F	1. Threats are attacks carried out. 
T	F	2. Computer security is protection of the integrity, availability, and 
 confidentiality of information system resources. 
 
T	F	3. Data integrity assures that information and programs are changed only 
 in a specified and authorized manner. 
 
T 	F	4. Availability assures that systems works promptly and service is not 
 denied to authorized users. 
 
T	F	5. The “A...
Test Bank—Chapter Two (Data Manipulation) 
The following table is from Appendix C of the text. It is included here so that it can be incorporated in tests for student reference. Questions in this test bank refer to this table as the “language description table.” 
 Op- 
 code Operand 		Description 
	1	RXY	LOAD the register R with the bit pattern found in the memory cell whose address is XY.				Example: 14A3 would cause the contents of the memory cell located at address A3 to be pl...
3.1 Introduction 
(No Questions) 
3.2 Algorithms 
 
3.1 Specifying the order in which statements are to be executed in a computer program is called 
(a) an algorithm 
(b) transfer of control 
(c) program control 
(d) pseudocode 
ANS: (c) 
 
 
3.2. The two key attributes of an algorithm are: 
a) actions and start activity 
b) flow and order of flow 
c) actions and order of actions 
d) flow and start activity 
ANS: (c) 
3.3 Pseudocode 
 
3.3 Which of the following is true of pseudocode programs? 
...