Sample Paper 2
Sample Paper 2
machine
16. Each assembly language statement corresponds to, at most, one ____________________ language statement.
ANSWER: machine
17. Individual assembly language statements, though easier to read, can be no more powerful than the underlying
instruction set
____________________.
ANSWER: instruction set
18. When we moved from machine language to assembly language, we needed a piece of system software—a(n)
assembler
____________________—to translate assembly language instructions into machine language.
ANSWER: assembler
20. Newer languages such as Java and C# were developed specifically to run on a variety of hardware platforms without
compiler
the need for a separate ____________________ for each type of machine.
ANSWER: compiler
22. In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at
memory location
the level of what is going on in individual ____.
a. memory locations
b. programs
c. subtasks
d. tasks
ANSWER: a
assembly language.
23. High-level programming languages were created to overcome the deficiencies of _______
a. compiling
b. assembly
c. object
d. link
ANSWER: b
25. The software translator used to convert our high-level language instructions into machine language instructions is
compiler
called a(n) ____.
a. compiler
b. editor
c. loader
d. linker
ANSWER: a
object code for a task that needs to be performed often can be stored in a code library
27. The ______
a. object
b. processing
c. container
d. assembly
ANSWER: a
imperative
28. Procedural languages are also called ____ languages.
a. immediate
b. translated
c. interpreted
d. imperative
ANSWER: d
programming language
29. Imperative commands are instructions in the _______.
a. machine Language
b. assembly Language
c. processing language
d. programming language
ANSWER: d
st.
31. Syntax is the rules for exactly how _______ must be written in a programming language.
a. orders
b. instructions
c. executables
d. statements
ANSWER: d
32. Which language does NOT require a semicolon to terminate an executable program statement?
a. Python
b. Ada
c. C++
d. C#
ANSWER: a
33. The ____ evaluates a proposed project and compares the costs and benefits of various solutions.
a. design study
b. feasibility study
c. specification study
d. work breakdown study
ANSWER: b
34. _______ is the time to plan how the program will accomplish the determined task.
a. Program design
b. Assembly design
c. Processing design
d. Program statement document
ANSWER: d
35. ____ is the process of translating the detailed designs into computer code.
a. Translating
b. Interpreting
c. Coding
d. Configuring
ANSWER: c
37. ____ a program means running it on many data sets to be sure its performance falls within required limits.
a. Debugging
b. Benchmarking
c. Configuring
d. Coding
ANSWER: b
38. ____ includes online tutorials or help systems that the user can bring up while the program is running, and (less often)
written user’s manuals.
a. Technical documentation
b. Rough documentation
c. First-level documentation
d. User documentation
ANSWER: d
40. Rapid prototyping allows _______ between the user and the programmer to be identified and corrected early in the
development process.
a. processing errors
b. config errors
c. miscommunications
d. interfacing errors
ANSWER: c
parse tree
7. The output of a parser is a(n) complete ____________________, or an error message if one cannot be constructed.
ANSWER: parse tree
Grammars
9. ____________________ for high-level languages like C++ or Java are very large.
ANSWER: Grammars
local
10. One of the possible _______ optimizations is eliminating unnecessary operations.
ANSWER: local
syntactically
21. During the parsing phase, the sequence of tokens formed by the scanner is checked to see whether it is _________
correct according to the rules of the programming language.
a. grammatically
parse- parse tree - syntactically- arranged gramatically until
b. algorithmically
c. always deriserd goal is achieved
d. syntactically
ANSWER: d
22. In the ____ phase, the compiler examines the individual characters in the source program and groups them into
tokens.
a. semantic analysis and code generation
lexical
b. parsing
c. lexical analysis
d. code optimization
ANSWER: c
23. In the ____ phase, the compiler takes the generated code and sees whether it can be made more efficient, either by
making it run faster or having it occupy less memory.
a. code optimization code optimization
b. parsing
c. lexical analysis
d. semantic analysis and code generation
ANSWER: a
25. A ____ shows how individual tokens can be grouped into predefined grammatical categories until the desired goal is
reached.
COMP 125 Page 5
Sample Paper 2
parse tree
a. parse tree
b. scanner
c. parser
d. compiler
ANSWER: a
26. In _______, a nonterminal is an intermediate grammatical category used to help explain and organize the language.
a. code optimization
b. BNF
c. OOP parse
d. parsing
ANSWER: d
27. The collection of all statements that can be successfully parsed is called the ____ defined by a grammar.
a. language
b. terminal lang.
c. nonterminal
d. rule
ANSWER: a
29. In BNF, the ____ is used to separate two alternative definitions of a nonterminal.
a. forward slash
b. vertical bar
c. backward slash | vertical bar|
d. asterisk
ANSWER: b
30. ____ parsing algorithms examine several tokens “down the road” to see what would happen if a certain choice was
made.
a. Look-ahead
look ahead
b. Token prediction
c. Down-the-road
d. Recursive
ANSWER: a
32. During parsing, a compiler deals only with the ____ of a statement.
a. semantics
b. syntax
c. grammar
d. rules
ANSWER: b
33. A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its
data type.
a. rule
b. production
c. parse tree
d. semantic record
ANSWER: d
34. Following ____, the compiler makes a second pass over the parse tree to produce the translated code.
a. semantic analysis
b. lexical analysis
c. code optimization
d. code generation
ANSWER: a
35. ____ begins at the productions in the tree that are nearest to the original input tokens.
a. Code generation
b. Parsing
c. Lexical analysis
d. Semantic analysis
ANSWER: a
36. ____ is where the compiler polishes and fine-tunes the translation so that it runs a little faster or occupies a little less
memory.
a. Compilation
b. Generation
c. Optimization
d. Efficiency
COMP 125 Page 7
Sample Paper 2
ANSWER: c
37. ____ is the ability to write highly optimized programs that contain no wasted time or unnecessary memory cells.
a. Conciseness
b. Ambiguity
c. Code-aware
d. Efficiency
ANSWER: d
39. ____ is the replacement of slow arithmetic operations with faster ones.
a. Strength reduction
b. Constant evaluation
c. Eliminating unnecessary operations
d. Parse tree construction
ANSWER: a
40. In global optimization, the compiler looks at ______ segments of the program to decide how to improve performance.
a. large
b. small
c. incorrect
d. syntactical
ANSWER: a
9. One consequence of a(n) ____________________ problem related to the halting problem is that no program
can be written to decide whether any given program always stops eventually, no matter what the input is.
10. The real value of Turing machines as models of computability is in exposing problems that are
____________________.
ANSWER: uncomputable
21. A formal basis for proofs might allow for ____ theorem-proving.
a. unsolvable
b. mechanical
c. indisputable
d. observable
ANSWER: b
22. The symbols for a Turing machine must come from a finite set of symbols called the tape ____.
a. alphabet
b. placeholder
c. blank
d. palette
ANSWER: a
23. At any point in time, only a finite number of cells in the Turing machine input contain ____ symbols.
a. blank
b. placeholder
c. alphabetic
d. nonblank
ANSWER: d
25. State ____ is always the start-up state of the Turing machine.
a. 0
b. 1
c. L
d. R
ANSWER: b
26. A Turing machine ____ is a collection of instructions that allow a Turing machine to carry out a certain task.
a. program
b. sequence
COMP 125 Page 9
Sample Paper 2
c. algorithm
d. tape
ANSWER: a
28. A(n) ____ takes the bits in a string and changes the 1s to 0s and the 0s to 1s.
a. bit inverter
b. unary converter
c. Turing inverter
d. incrementer
ANSWER: a
29. An extra bit, called a(n) ____, can be attached to the end of a string of bits.
a. state bit
b. odd parity bit
c. inverted bit
d. sentinel bit
ANSWER: b
30. The term unary means that we will use ____ symbol(s).
a. one
b. two
c. three
d. four
ANSWER: a
31. We can write a Turing machine to add 1 to any number; such a machine is often called a(n) ____.
a. unary operator
b. bit adder
c. parity machine
d. incrementer
ANSWER: d
32. The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine
to do that task.
a. Church–Turing thesis
b. Church–Alan theorem
c. Church–Zimmerman thesis
d. Alan–Zimmerman thesis
COMP 125 Page 10
Sample Paper 2
ANSWER: a
33. A(n) ____ is a statement advanced for consideration and maintained by argument.
a. algorithm
b. contradiction
c. thesis
d. 5-tuple
ANSWER: c
34. The ____ thesis can never be proved because the definition of an algorithm is descriptive, not mathematical.
a. Church–Zimmerman
b. Church–Turing
c. Church–Alan
d. Alan–Zimmerman
ANSWER: b
35. Turing machines define the limits of ____, which is what can be done by symbol manipulation algorithms.
a. computability
b. extensibility
c. compatibility
d. correspondence
ANSWER: a
37. The proof by ____ approach assumes that a specific Turing machine does exist and then shows that this assumption
leads to an impossible situation.
a. contradiction
b. inference
c. deduction
d. impossibility
ANSWER: a
38. We assumed that there was a Turing machine that could solve the halting problem, and this assumption led to a(n)
____.
a. computable problem
COMP 125 Page 11
Sample Paper 2
b. impossible situation
c. unsolved problem
d. complex solution
ANSWER: b
39. Unsolvable problems related to the halting problem have the following practical consequence: ____.
a. a program can be written to decide whether any given program run on any given input will produce some
specific output.
b. a program can be written to decide whether any two programs are equivalent.
c. a program can be written to decide whether any given program always stops eventually, no matter what the
input.
d. no program can be written to decide whether any given program run on any given input will ever produce
some specific output.
ANSWER: d
40. It is important to note that unsolvable problems related to the halting problem are unsolvable because of their ____.
a. generality
b. complexity
c. specificity
d. simplicity
ANSWER: a
16. You maintain a ____ web presence to streamline transactions between you as the seller and other businesses as buyers.
a. B2B
b. S2B
c. B2S
d. C2B
ANSWER: a
17. In the ____ world, customers have quick, easy, and secure access to purchasing items and paying for services through
the World Wide Web.
a. e-transactions
b. ecommerce
c. web commerce
d. virtual commerce
ANSWER: b
21. As of April 2017, ____ had almost 169 million active registered users, and there were over 800 million listings of
items for sale.
a. Groupon
b. eBay
c. PayPal
d. Craigslist
ANSWER: b
22. Services such as Apple Pay and PayPal are examples of __________.
a. electronic payment systems
b. automated payment systems
c. data-driven payment systems
d. network-based payment systems
ANSWER: a
27. A ____ is one where multiple keys are needed to identify a tuple uniquely.
a. unique primary key
b. discrete primary key
c. foreign primary key
d. composite primary key
ANSWER: d
28. A database management system can relate information between various tables through ____ values.
a. special
b. prepared
c. key
d. primary
ANSWER: c
29. A ____ gives the user, or the user’s application software, the ability to combine and manipulate data easily in ways
that would be very difficult if the data were kept in separate and unrelated files.
a. file
b. database
c. datastore
d. data system
ANSWER: b
30. A ____ is a collection of databases that contain current and archived data used for research and analysis purposes
rather than to manage day-to-day business transactions such as inventory control or payroll data.
a. data mine
b. data broker
c. data warehouse
d. daisy chain
ANSWER: c
31. ____ is the process of automatically analyzing large amounts of data to discover and interpret previously hidden
patterns contained therein.
a. Phishing
COMP 125 Page 14
Sample Paper 2
b. Data mining
c. Metadata searching
d. Data warehousing
ANSWER: b
32. A ____ runs Bitcoin software that verifies (using a hash function) that the blockchain has not been altered in any way
since the previous transaction, and for this service, the miner is rewarded with new bitcoins.
a. dumpster diver
b. Groupon bot
c. virtual currency specialist
d. bitcoin miner
ANSWER: d
33. A good DBMS incorporates the services of a ____ to organize the disk files in an optimal way, in order to minimize
access time to the records.
a. sophisticated file manager
b. simple file manager
c. special operating system service
d. specialized file system
ANSWER: a
34. ____ allow the physical data to reside at separate and independent locations that are electronically networked together.
a. Discrete databases
b. Singleton databases
c. Distributed databases
d. Normalized databases
ANSWER: c
35. The term __________ expresses that we now have huge amounts of data available.
a. data warehouse
b. data store
c. big data
d. large data
ANSWER: c
36. A(n) ____________________ is a graphical ad, often with animation, placed in a prominent position on a webpage.
ANSWER: banner ad
37. Using multiple ____________________ in a single database minimizes the amount of work required to maintain
consistency in the data.
ANSWER: tables
38. A program written in ____________________ asks for something to be done, but it does not contain a specific
sequence of instructions on how it is to be done.
ANSWER: SQL
40. In general, issues of personal privacy and public safety are magnified enormously by the capabilities of
____________________ databases.
ANSWER: networked
16. The first commercially marketed computer was the UNIVAC I manufactured by _____________.
a. Remington Rand
b. International Business Machines (IBM)
c. Hewlitt-Packard
d. Dedicated Electronic Logical Logarithms (DELL)
ANSWER: a
17. On March 31, 1952, the UNIVAC I was delivered to the ____.
a. U.S. Army
b. U.S. Census Bureau
c. Atomic Energy Commission
d. General Electric
ANSWER: b
18. Conditions in the computing environment changed dramatically in the late 1960s due to the development of ________
and integrated circuits.
a. parallel CPUs
b. dedicated GPUs
c. transistors
d. silicon chips
ANSWER: c
19. In 1965, Digital Equipment Corp. (DEC) rolled out the _______, the world’s first “minicomputer.”
a. UNIVAC II
b. DEC Mark IV
c. JDI Force
d. PDP-8
ANSWER: d
20. Atari released its first product in 1975, an arcade game called ____.
a. Ping
b. Tetris
c. Pong
d. Frogger
COMP 125 Page 16
Sample Paper 2
ANSWER: c
21. King Kong’s movements in the 1933 film were created using a manual technique called ____.
a. CGI
b. film overlay
c. skip-motion animation
d. stop-motion animation
ANSWER: d
23. The sequence of operations that must be completed successfully to produce a realistic three-dimensional image
sequence is termed the ____.
a. graphics streamline
b. graphics pipeline
c. graphics mode
d. graphics perspective
ANSWER: b
24. Using a CGI technique called keyframing, a human animator only needs to produce only the _________ in a
sequence, and the elapsed time.
a. central cells (CC)
b. wire-frame
c. first and last frame
d. Prolog algorithm
ANSWER: c
25. The branch of computer graphics that studies methods for creating images at a rate matching that of the real world is
called ____.
a. just-in-time graphics
b. real-time graphics
c. new world graphics
d. real-world graphics
ANSWER: b
26. A GPU executes instructions in parallel with the ________, the main processor, and carries out all graphics operations
including modeling, motion, rendering, and display.
a. CPU
COMP 125 Page 17
Sample Paper 2
b. NPU
c. PGU
d. GIPU
ANSWER: a
27. Typically, a(n) ____ has its own dedicated random-access memory where it stores its image data and which is
separate from primary memory.
a. CPU
b. PPU
c. GPU
d. MPU
ANSWER: c
28. In the technique known as ____, first it is determined which planes can be seen from the user’s point of view, based
on location and opaqueness, and then only those objects visible in the next frame are rendered, omitting all operations on
hidden surfaces.
a. culling
b. clicking
c. slicing
d. striping
ANSWER: a
29. ____ are fully modeled and fully rendered objects stored in a video library in video memory.
a. Cut-outs
b. Cut-ins
c. Block-ins
d. Block-outs
ANSWER: b
30. ____ games allow a large number of players, often thousands or tens of thousands, to interact, form groups, and
compete against one another within a simulated virtual world.
a. MMPRG
b. MMRPG
c. MMORG
d. MMOG
ANSWER: d
31. The world in which the MMOG action takes place is created and managed by special computers called ____.
a. game hosts
b. game servers
c. game clients
d. game servlets
COMP 125 Page 18
Sample Paper 2
ANSWER: b
32. Users log on to the MMOG game server whenever they wish, using ____ software running on their home computer or
laptop.
a. client
b. server
c. servlet
d. hosting
ANSWER: a
34. The most widely used and well-known _______ is Second Life, a virtual world created by Linden Labs in 2003.
a. omniverse
b. metaverse
c. multiverse
d. virtualverse
ANSWER: b
35. ____ is a rapidly growing area of computer and biological science research in which computers and graphics software
are used to produce highly accurate two- and three-dimensional images of the human body.
a. Medical processing
b. Medical imaging
c. Virtual medicine
d. Visual medicine
ANSWER: b
36. In CGI, the abstract concept of motion is defined in terms of matrix ____________________, an algorithmic
operation easily programmed on a computer.
ANSWER: multiplication
37. ____________________ means taking an object stored as a mathematical model and converting it into a fully formed,
visually pleasing three-dimensional image.
ANSWER: Rendering, rendering
38. ____________________ algorithms follow millions (or billions) of light rays from their source to an object’s surface
and any subsequent reflections can produce truly lifelike images and take minutes or hours to render a single frame.
ANSWER: Ray-tracing ray tracing
40. ____________________ is an important feature of MMOGs, which must keep track of each user’s activity to ensure
that his or her actions do not incorrectly or inappropriately affect the actions of other players.
ANSWER: Game security