Invitation To Computer Science 7th Edition Schneider Test Bank Download
Invitation To Computer Science 7th Edition Schneider Test Bank Download
4. Each symbolic assembly language instruction is translated into one or more machine language instructions.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 286
7. Assembly language does not allow the use of symbolic operation codes.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 288
9. In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the
maximum length of time.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 323-324
10. Clients cannot perform local computations without access to the network.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: 325
11. Assemblers, compilers, and interpreters are all examples of ____________________ services.
ANSWER: language
Cengage Learning Testing, Powered by Cognero Page 2
Name: Class: Date:
13. A(n) ____________________ character is displayed on screen to indicate that an operating system is waiting for
input.
ANSWER: prompt
POINTS: 1
REFERENCES: 309
14. It is the responsibility of the ____________________ to safeguard the password file that stores all valid user
name/password combinations.
ANSWER: OS
operating system
OS (operating system)
operating system (OS)
POINTS: 1
REFERENCES: 312
15. Typically, all requests to a(n) ____________________ operating system are prioritized.
ANSWER: real time
real-time
POINTS: 1
REFERENCES: 327
16. For a program to run on a naked machine, it must be represented in decimal. _________________________
ANSWER: False - binary
POINTS: 1
REFERENCES: 280
17. A single high-level language instruction is typically translated into many high-level language instructions.
_________________________
ANSWER: False - machine
POINTS: 1
REFERENCES: 287
18. The variable used to determine the address of a given instruction or piece of data is called the program counter.
_________________________
ANSWER: False - location
POINTS: 1
REFERENCES: 303
20. Second-generation operating systems are called multiprogrammed operating systems. _________________________
ANSWER: False - Third, 3rd
POINTS: 1
REFERENCES: 321
21. A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.
a. distributed b. virtual
c. assembler d. naked
ANSWER: d
POINTS: 1
REFERENCES: 280
22. The ____ hides from the user the messy details of underlying hardware.
a. interface b. operating system
c. system software d. machine code
ANSWER: a
POINTS: 1
REFERENCES: 281
23. System software acts as a(n) ____ between the users and the hardware.
a. translator b. intermediary
c. tester d. security agent
ANSWER: b
POINTS: 1
REFERENCES: 282
24. The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.
a. naked b. virtual
c. assembler d. Von Neumann
ANSWER: b
POINTS: 1
REFERENCES: 282
25. ____, such as text editors, are sometimes organized into collections called program libraries.
a. Programming tools b. Office tools
c. Packages d. Utilities
ANSWER: d
POINTS: 1
Cengage Learning Testing, Powered by Cognero Page 4
Name: Class: Date:
26. In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.
a. assembly b. machine
c. low-level programming d. high-level programming
ANSWER: b
POINTS: 1
REFERENCES: 286
31. In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.
a. op code mnemonic b. comment
c. address field d. label
ANSWER: d
POINTS: 1
REFERENCES: 290
33. A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do
next.
a. iterative b. conditional
c. sequential d. transformer
ANSWER: b
POINTS: 1
REFERENCES: 296
34. The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it
into a Von Neumann computer, and executing to produce answers to the problem.
a. Von Neumann b. modern
c. algorithmic d. conditional
ANSWER: c
POINTS: 1
REFERENCES: 299
35. The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure
called the ____.
a. op code table b. assembler
c. loader d. library
ANSWER: a
POINTS: 1
REFERENCES: 301
36. If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.
a. sequential b. binary
c. op code d. table
ANSWER: b
POINTS: 1
REFERENCES: 301
37. After all the fields of an assembly language instruction have been translated into binary, the newly built machine
language instruction and the address of where it is to be loaded are written out to a file called the ____ file.
a. table b. source
c. data d. object
ANSWER: d
POINTS: 1
38. Icons displayed on the screen are selected with a mouse and a button using a technique called ____.
a. windows interface b. point-and-click
c. panel interface d. command line
ANSWER: b
POINTS: 1
REFERENCES: 309-310
39. ____ operation codes are restricted to be used in the operating system or other system software.
a. Privileged b. User
c. Specialized d. System
ANSWER: a
POINTS: 1
REFERENCES: 322
40. A ____-generation operating system will typically be a parallel processing operating system that can efficiently
manage computer systems containing tens, hundreds, or even thousands of processors.
a. second b. third
c. fourth d. fifth
ANSWER: d
POINTS: 1
REFERENCES: 328
41. What are three major advantages to writing programs in assembly language rather than machine language?
ANSWER: 1) Use of symbolic operation codes rather than numeric (binary) ones
2) Use of symbolic memory addresses rather than numeric (binary) ones
3) Pseudo-operations that provide useful user-oriented services such as data generation
POINTS: 1
REFERENCES: 288
TOPICS: Critical Thinking
45. Briefly explain the function of the operating system as a security guard.
ANSWER: The operating system controls access to the computer and its resources. It must prevent unauthorized
users from accessing the system and prevent unauthorized users from doing unauthorized things. At a
minimum, the operating system must not allow people to access the computer if they have not been
granted permission.
POINTS: 1
REFERENCES: 311
TOPICS: Critical Thinking
46. To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this
created item do?
ANSWER: To make a Von Neumann computer usable, we must create an interface between the user and the
hardware. This interface does the following things:
• Hides from the user the messy details of the underlying hardware
• Presents information about what is happening in a way that does not require in-depth knowledge of the
internal structure of the system
• Allows easy user access to the resources available on this computer
• Prevents accidental or intentional damage to hardware, programs, and data
POINTS: 1
REFERENCES: 281
TOPICS: Critical Thinking
48. What is the single most important piece of system software on the computer? Discuss its function, and discuss at
length its software packages that handle the requests of other programs.
Cengage Learning Testing, Powered by Cognero Page 8
Name: Class: Date:
• User interface—All modern operating systems provide a powerful graphical user interface (GUI) that
gives the user an intuitive visual overview as well as graphical control of the capabilities and services of
the computer.
• Language services—These programs, called assemblers, compilers, and interpreters, allow you to write
programs in a high-level, user-oriented language rather than machine language and to execute these
programs easily and efficiently. They often include components such as text editors and debuggers.
• Memory managers—These programs allocate memory space for programs and data and retrieve this
memory space when it is no longer needed.
• Information managers—These programs handle the organization, storage, and retrieval of information
on mass storage devices such as hard drives, CDs, DVDs, flash drives, and tapes. They allow you to
organize your information in an efficient hierarchical manner, using directories, folders, and files.
• I/O systems—These software packages allow you to easily and efficiently use the many different types
of input and output devices that exist on a modern computer system.
• Scheduler—This system program keeps a list of programs ready to run on the processor, and it selects
the one that will execute next. The scheduler allows you to have a number of different programs active at
a single time, for instance, surfing the Web while you are waiting for a file to finish printing.
• Utilities—These collections of library routines provide a wide range of useful services either to a user
or to other system routines. Text editors, online help routines, image and sound applications, and control
panels are examples of utility routines. Sometimes these utilities are organized into collections called
program libraries.
POINTS: 1
REFERENCES: 284-285
TOPICS: Critical Thinking
50. Explain what a real-time operating system does. Then give a detailed example.
ANSWER: A real-time operating system manages the resources of embedded computers that are controlling ongoing
physical processes and that have requests that must be serviced within fixed time constraints. This type
Cengage Learning Testing, Powered by Cognero Page 9
Name: Class: Date: