Upgrade to remove ads
Terms in this set (19)
A(n) ____________________ is a step-by-step procedure for solving a problem in a finite amount of time.
A(n) ____________________ is a program that replicates itself, with the goal of spreading to other computers, usually via email or shared files.
Which of the following terms describes the repetition of statements (instructions) while certain conditions are met?
True or False? In the "solve by analogy" technique, you solve a problem by modifying the solution to a similar problem.
A program written in a high-level programming language is called the ____________________ program.
Of the following components of a computer, which one fetches the next instruction from RAM during program execution?
Any knowledge that can be communicated
A step-by-step procedure for solving a problem in a finite amount of time
A set of rules, symbols, and special words used to construct a computer program
A programmable device that can store, retrieve, and process data
The written text and comments that make a program easier for others to understand, use, and modify
A sequence of instructions to be performed by a computer
Information in a form a computer can use
Planning or scheduling the performance of a task or event
True or False? An assembler is a program that translates an assembly language program into a high-level language.
false -into machine code
Which of the following translates a program written in a high-level language into machine code?
____________________ is information that has been put into a form that a computer can use.
Which problem-solving technique involves integrating existing solutions on a step-by-step basis into a complete solution?
True or False? The two components of the central processing unit (CPU) are the arithmetic/logic unit and the control unit.
Which problem-solving technique involves recognizing that the problem you are working on is similar to one that you have worked on before?
solving by analogy
Of the following components of a computer, which one presents the results of the processing to the outside world?
A(n) ____________________ exploits gaps in a computer's security, hijacking it to search the Internet for other computers with similar gaps
True or False? All computer viruses are destructive to computer resources
A general solution, or algorithm, is written during the ____________________ phase of a computer program's life cycle.
The ____________________ program is the machine language version of a source program.
THIS SET IS OFTEN IN FOLDERS WITH...
CSC Chapter 3
Units 1 and 2 Vocabulary Study Set
YOU MIGHT ALSO LIKE...
Programing and Problem sovling with c++
CSCI 111 Chp. 1
Ch. 13 Intro to Data Processing (Programming & Lan…
OTHER QUIZLET SETS
ENV 1301-07 Exploring Environmental Issues Dr. Mel…
S/A Quizzes - Disinfectants and Parasitology Techn…
Exam 4 notes
HESI exam reading practice