Question: 2. Multiple Choice (a) Every legal expression in Racket consists of (i) parameters. (ii) a lambda function. (iii) either an atom or a list. (iv)
2. Multiple Choice
(a) Every legal expression in Racket consists of
(i) parameters.
(ii) a lambda function.
(iii) either an atom or a list.
(iv) (car (cdr p))
(v) an assignment statement.
(b) Assembly language programs avoid hard-coded memory addresses by using
(i) labels.
(ii) data.
(iii) op-codes.
(iv) branching.
(v) condition codes.
(c) The phases of the compilation process (in order) are
(i) Code optimization; Semantic analysis; Lexical analysis; Parsing
(ii) Lexical analysis; Parsing; Semantic analysis; Code optimization
(iii) Semantic analysis; Parsing; Lexical analysis; Code optimization
(iv) Parsing; Lexical analysis; Code optimization; Semantic analysis
(v) Semantic analysis; Lexical analysis; Code optimization; Parsing
(d) The programming language that was developed for systems programming and that also replaced FORTRAN as the dominant scientific programming language was
(i) LISP.
(ii) Pascal.
(iii) C++.
(iv) BASIC.
(v) C.
(e) What kind of operating system was prevalent in the era when users rarely had monitors?
(i) GUI
(ii) command interpreter
(iii) batch
(iv) real-time
(v) menu-driven
(f) The Java language is
(i) compiled
(ii) interpreted
(iii) assembled
(iv) compiled and interpreted
(v) assembled and simulated
(g) The biggest obstacle to security on the internet is
(i) the difficulty in formulating comprehensive rules for legitimate use as opposed to the abusive or criminal use
. (ii) the lack of constitutional protections.
(iii) it's size.
(iv) the lack of adequate encryption technology. (v) the French.
(i) Alan Turing is known for
(i) developing a mathematical model of computation.
(ii) his contributions to breaking German war codes in WWII.
(iii) proposing a method for measuring machine intelligence.
(iv) the prestigious ACM technical award that bears his name.
(v) all of the above.
(h) In order for a single-processor machine to run multiple applications simultaneously, it must employ a technique called time-sharing, in which each process is assigned to the CPU for a length of time called
(i) a millisecond.
(ii) a unit interval.
(iii) a time slice.
(iv) a turn.
(v) a miracle.
(j) Which of the following is not part of the information contained in a Turing Machine instruction?
(i) current state
(ii) symbol to write to tape
(iii) read/write head location
(iv) direction to move
(v) next state
(k) When a cryptography system uses different keys for the encryption and decryption processes it is called
(i) a Diffie-Helman key exchange.
(ii) asymmetric encryption.
(iii) symmetric encryption.
(iv) DES.
(v) only Bruce Schneier knows.
(l) Into which state does a process transition when an input request is completed?
(i) ready
(ii) running
(iii) waiting
(iv) terminated
(v) started
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
