The document appears to be a quiz covering various topics related to computers, programming, and software. It includes multiple choice, true/false, and matching questions testing knowledge of topics like email etiquette, computer security, spreadsheets, databases, JavaScript, algorithms, and complexity theory. The quiz contains 100 questions in total across the different formats.
1. Which of the following is not one of the rules cited in class
for making e-mail more effective?
FOR MORE CLASSES VISIT
www.tutorialoutlet.com
Which of the following is not one of the rules cited in class for
making e-mail more effective?
A. Include Context B. Ask about one topic at a time
C. Use all capital letters D. Answer a backlog of email in reverse
order
2. Which of the following is not an area to protect our computer in?
A. Installing protective systems. B. Tuning the installed protection
C. Wrapping the computer in foil D. Behaving to avoid difficulties
3. Which of the following is an example of identity theft?
A. taking a test for someone else B. using your older sibling's ID
2. C. posing as someone you're not to vote D. all of the above
4. The result of XORing 1011 1011 with 1001 0110 is
A. 0101 1100 B. 0101 0010 C. 1011 1111 D. 0100 0000
5. Respectively, rows and columns are designated with
A. numbers, letters B. letters, numbers C. numbers, numbers D.
names, numbers
6. Spreadsheet formulas start with
A. + B. = C. @ D. !
7. Which of the following is not a valid range of cells?
A. A1>A5 B. C3-C8 C. 3B:6B D. all of the above
Page 27 of 30
3. 8. All of the following are basic spreadsheet principles except
A. logical form B. clean layout C. no text D. clear and understandable
entries
9. To get the first characters in a cell you should use the
A. Begin function B. Start function C. Left function D. Get function
10. If you found regHours in a spreadsheet formula you'd know it's a
A. mistake B. named reference C. constant D. function
11. Which of the following is a valid XML tag?
A. <active?> B. <grad-date> C. <zip code> D. <DOB>
12. Which of the following is not one of the standard operations on
databases?
A. Project B. Select C. Disassemble D. Union
4. 13. The symbol to terminate a statement in JavaScript is
A. ~ B. ! C. . D. ;
14. Which of the following is not a term used to describe changing the
value of a variable?
A. assign B. gets C. sets D. becomes
15. All of the following are input elements except
A. print B. radio button C. text box D. checkbox
16. In JavaScript, onclick is a(n)
A. variable B. event C. event handler D. button
17. The building blocks of programming are
A. programming languages B. functions C. HTML and JavaScript D.
variables
5. and events
18. Random numbers in JavaScript are generated using
A. Math.random() B. Rnd C. Math.rnd D. Random.Math()
19. Which keyword generally begins the last line of a function?
A. end B. final C. outtie D. return
20. A false outcome for a termination test means
A. terminate the loop B. terminate the program
C. continue the loop D. do not enter the loop
21. The maximum number of times a loop can iterate is
A. 1024 B. 65,536 C. 1,048,576 D. infinite
6. 22. Array elements cannot be numbered with
A. negative numbers B. decimals C. letters D. all of the above
23. Computers can
A. think B. manipulate information C. be creative D. all of the above
24. All computer computations can be completed with just
A. 4 instructions B. 6 instructions C. 9 instructions D. 11
instructions
25. For quality control purposes, enter B here. Also, take a deep
breath and relax.
A. Not this one B. This one C. Not this one either D. Definitely not
this one
Matching (50 pts)
7. A. spam B. spyware C. phishing D. rootkit E. worm
26. Software that directly manipulates the OS to hide its presence.
27. Social engineering concept that involves convincing trusting
people to give up personal data.
28. Software that snoops on private information.
29. Software that copies itself over the Internet and contains malicious
code.
30. Unsolicited commercial email.
A. cookie B. data controller C. key D. key escrow E. trapdoor
31. Registering a key with a third party so it can be retrieved easily.
32. In the RSA scheme, requires a 129 digit sequence made of the
product of two prime
numbers.
8. 33. The person setting policies for private information
34. Sending data to a third party before it is encrypted to bypass the
usage of the key.
35. A record containing seven fields of information that uniquely
identify a customer's session.
A. absolute cell reference B. relative cell reference C. function
D. foreign data E. delimited
36. Character symbolizing the end of each field (generally tab or
semicolon)
37. A3
38. Data from another application to be imported into the spreadsheet
39. $A$3
40. MAX(A3:F3)
9. A. conditional formatting B. conditional formulas C. symbolic
reference
D. literal reference E. filtering
41. Select only certain rows from a list.
42. Explicit column/row position
43. Make the entire computation of a cell contingent on the outcome
of a condition
44. A word or phrase assigned to a cell or a range of cells
45. Applying an interpretation to the data and express that
interpretation in an easy to see
manner.
A. root element B. entity C. data type D. atomic E. relationship
46. The tag that encloses all of the content of the XML file.
10. 47. Number, text, image, etc.
48. Anything that can be identified by a fixed number of its
characteristics.
49. A correspondence between rows of one table and the rows of
another table.
50. Not decomposable into any smaller parts.
A. programming B. assignment C. undefined D. Booleans E.
compound
statement
51. When a name is declared but no value is assigned yet.
52. True or false.
53. Changing the value of a variable.
54. Groups of statements surrounded by {}.
11. 55. The act of formulating an algorithm into code.
A. event handler B. onclick C. onchange D. dot operator E. event
56. The program that performs the task to respond to an event.
57. The event handling attribute for a button.
58. The event handling attribute for a text field
59. Provides a means of navigation to the proper object, selecting the
property of an object.
60. An indication from the computer that something just happened.
A. parameters B. call C. local variables D. global variables E. scope
61. Property that allows a local and global variable to share the same
name.
62. Declared outside of any function, they can be used throughout the
whole program.
12. 63. Declared in a function and can only be used therein.
64. Run or execute the statements of the function to produce an
answer.
65. Values the function will compute on, the input of the function.
A. iteration B. initialization C. nested loop D. array E.handle
66. A loop within a loop.
67. Set the iterations variable's value for the first iteration of the loop.
68. Looping through a series of statements to repeat them.
69. A special code the computer uses to identify an object like a timer.
70. An indexed base name.
A. evaluation function B. parallel computation C. metarules
D. Universality Principle E. intractable
13. 71. Rules that describe how to break or transcend existing rules.
72. Any computer can simulate any other computer using only simple
instructions
73. The application of several computers to a task.
74. A problem that cannot be solved with a realistic amount of
computer time on any computer.
75. A procedure that assigns a value to each piece and computes a
score for each move.
True/False (25 points)
76. One good method for creating a password is to take an acronym of
something you like and
substitute harder-to-guess pieces into it.
A. True B. False
14. 77. Passwords are generally stored in plain text to allow the
administrator easy access.
A. True B. False
78. A third-party cookie can use a loophole to get your information
across different sites.
A. True B. False
79. Backups are not a good idea for sensitive or important data.
A. True B. False
80. Text that is too long for a cell to display is truncated.
A. True B. False
81. To change a relative cell reference to an absolute reference, you
should use the ampersand
(&).
15. A. True B. False
82. In the example we did in class, the trip being planned was to the
Arctic Circle.
A. True B. False
83. Spreadsheets can be sorted based on the current row, not by the
current column.
A. True B. False
84. Individual pages in a spreadsheet are called leafs.
A. True B. False
85. Database users usually access logical views, not the physical
database on the disk.
A. True B. False
86. - can be a binary or unary operator.
16. A. True B. False
87. JavaScript is mainly used for Web applications.
A. True B. False
88. When evaluating a statement with an = in it, start on the left side
and compute that first.
A. True B. False
89. Joining two strings together using the + is called concatenation.
A. True B. False
90. Radio button elements are used for both input and output.
A. True B. False
91. It is illegal to put a button element inside an XHTML table cell.
A. True B. False
17. 92. Every function must have at least one parameter.
A. True B. False
93. A random number generated in JavaScript is always between 0
and 1.
A. True B. False
94. When a local and global variable have the same name, the global
variable has priority in the
function the local variable is declared in.
A. True B. False
95. j++ is a shortcut that means add j + j.
A. True B. False
96. An indexed item is called an element.
18. A. True B. False
97. You can safely use an element that is past the bounds of the array.
A. True B. False
98. NP-complete problems have no known "practical" algorithmic
solutions.
A. True B. False
99. Work-proportional-to-n algorithms take longer than work-
proportional-to-n2 algorithms.
A. True B. False
100. Select A. here because it is True that you are done with this
class!
A. True B. False