Free Essay

Computer Logic Test

In:

Submitted By ickythump58
Words 3299
Pages 14
CHAPTER 1
Programs that make a computer useful for everyday tasks are known as ___.
Application Software
******
Which of the following is not an example of operating system software?
Microsoft Word
******
What function(s) does an interpreter perform with the instructions in a high-level programming language?
Translates and Execute
******
The term used for a set of rules that must be strictly followed when writing a program is:
Syntax
******
____ was the first high-level programming language designed that could perform complex mathematical calculations.
FORTRAN
******
Which computer language uses short words known as mnemonics for writing programs?
Assembly
******
The process known as the ____ cycle is used by the CPU to execute instructions in a program.
Fetch-decode-execute
******
Which of the following is not a microprocessor manufacturing company?
Dell
******
The following is an example of an instruction written in which computer language? 10110000
Machine language
******
What is the encoding technique called that is used to store negative numbers in the computer’s memory?
Twos complement
******
The ______ coding scheme contains a set of 128 numeric codes that are used to represent characters in a computer's memory.
ASCII
******
What is the largest value that can be stored in one byte?
255
******
The smallest storage location in a computer’s memory is known as a ______. bit ******
The disk drive is a secondary storage device that stores data by _______ encoding it onto circular disks. magnetically ******
A computer system consists of all of the following, except _______.
Operating System
******
TRUE/FALSE
******
Programs that use an interpreter generally execute faster than compiled programs because they are already entirely translated into machine language when executed.
ANS: F
Most programs written in a high-level language need to be translated into machine language.
ANS: F
Each instruction written in a high-level programming language is called a statement.
ANS: T
Assembly language is referred to as a low-level language because it is close to the C++ language.
ANS: F
The instruction set for a microprocessor is unique and is typically understood only by the microprocessors of the same brand.
ANS: T
The CPU understands instructions in machine language, which are written in binary.
ANS: T
A bit that is turned off is represented by the value -1.
ANS: F
The main reason for using secondary storage is to hold data for long periods of time, even when the power to the computer is turned off.
ANS: T
RAM is a volatile memory used for temporary storage while a program is running.
ANS: T
A computer is not a single device, but a system of devices that work together to manipulate data according to the instructions provided.
ANS: T

Chapter 2
Which error produces incorrect results but does not prevent the program from running? logic ******
The program development cycle is made up of ______ steps that are repeated until no errors can be found in the program.
Five
******
What is the informal language that programmers use to create models of programs that have no syntax rules and are not meant to be compiled or executed?
Pseudocode
******
The_____ is a diagram that graphically depicts the steps that take place in a program.
Flowchart
*****
A____ structure is a set of statements that execute in the order they appear.
Sequence
*****
Which symbol is used for an assignment statement in a flowchart?
Processing
*****
Which mathematical operator is used to raise five to the second power?
^
*****
The value of the expression 12 – 4 * 3 / 2 + 9 is ____.
15
*****
Which of the following is not a variable data type?
Number
*****
A___ is a name that represents a value that cannot be changed during the program’s execution.
Named constant
*****
____ documentation is a reference guide that describes the features of the program, designed for the user.
External
*****
The process where the programmer steps through each of the program’s statements one by one is called ____.
Hand tracing
*****
What is another term used for ‘desk checking’?
Hand tracing
*****
The following is an example of what type of statement: Set rate = 5.75
Assignment
*****
What symbol is used to mark the beginning and end of a string?
Quotation

TRUE/FALSE

Programmers start writing code as the first step when they begin a new project.
ANS: F The structure of the camelCase naming convention is to write the first word of the variable name in lowercase letters and then to capitalize the first character of the second and subsequent words.
ANS: T The expressions (a + b) / c and a + b / c will always yield identical results.
ANS: F An uninitialized variable is a variable that has been declared and automatically initialized to zero.
ANS: F A named constant can be assigned a value using a Set statement.
ANS: F A sequence of characters that is used as data is called a string in programming.
ANS: T Ovals are used as terminal symbols marking the starting and end of the pseudocode.
ANS: F Programmers use pseudocode to create ‘mock-ups’ of programs because they do not have to worry about syntax rules.
ANS: T
It has been proven by a group of mathematicians that all programs can be written using only three structures.
ANS: T A variable is a storage location in memory that is represented by a name and can hold different values during the execution of the program.
ANS: T

CHAPTER 3
******
Which of the following is not a benefit of using modules?
None of the above
******
The module definition comprises the module header and the module __________.
Body
******
The following is an example of a module ____. Call showNetPay()
Execution
******
What is the term used for the memory address of the location of the statement immediately after the module call?
Return point
******
In a flowchart, the module call is represented by a ___ symbol with vertical bars at each side.
Rectangle
******
What tool would a programmer use to visualize the relationship between modules?
Hierarchy charts
******
What is the term used for the variable that receives an argument that passed into a module?
Parameter
******
Passing an argument by ____ means that only a copy of the argument's value is passed into the parameter variable.
Value
******
Which type of variable is visible to every module and the entire program?
Global
******
Pass by ______ argument means that the argument is passed into a parameter that will reference the content of the argument in the module.
Reference
******
Which type of variable is not recommended to be used in programs because they make programs hard to understand and debug?
Global
******
When an argument is passed by _______, it is not affected by a change of the content of the parameter variable.
Value
******
Function is another name for _______.
Module
******
______ variables are useful for establishing two-way communication between modules.
Reference
******
What phrase is placed in the starting terminal symbol of a module in a flowchart?
Name of the module

TRUE/FALSE

Modules make it impossible for programmers to work in teams.
ANS: F
The top-down design process is sometimes called stepwise refinement.
ANS: T The scope of a variable is the segment of the program in which the variable can be accessed.
ANS: T A module can have two variables of the same name because they are within the same scope.
ANS: F The arguments in a module call and the parameters listed in the module header must be of compatible data types.
ANS: T

The scope of the parameter variables is the entire program and it is visible to any statement in the program.
ANS: F
When an argument is passed by value, the communication channel works only in one direction.
ANS: T
The hierarchy chart does not reveal any details of the steps taken inside the module.
ANS: T A pass by reference argument establishes a two-way communication with the module, but the value of the argument cannot be modified via the reference variable.
ANS: F
An attempt to pass a non-variable argument into a reference variable parameter will cause an error.
ANS: T
******
Chapter 4
******
Which structure is a logical design that controls the order in which a set of statements executes?
Control
******
Consider the following statement: A store is giving a discount of 30% for all purchases of over $100.
Which of the following is not the appropriate structure to use to program the statement?
Sequence
*****
The _______ symbol indicates that some condition must be tested in a flowchart.
Diamond
*****
What type of operator can be used to determine whether a specific relationship exists between two values?
Relational
*****
Which operator is used to determine that the operands are not exactly of the same value?
None of the above
*****
A case structure is a ___________ alternative decision structure.
Multiple
*****
Which of the following is a logical operator?
All of the above
*****
The _________ operator is a unary operator as it works with only one operand.
NOT
*****
The ________ operator could be used, in some situations, to simplify nested selection structures.
AND
*****
Which operator is best to determine whether x contains a value in the range of 10 through 57?
AND
*****
Which operator would make the following expression true?
False _______ True
OR
*****
Which operator would make the following expression false?
True _______ False
AND
*****
If the expression is false, the ____________ operator will return true.
NOT
*****
What type of operators are the following? > < >= <= == !=
Relational
*****
A condition is a _____________ expression.
Boolean
*****
TRUE/FALSE

True/False: It is possible to write a complete program using only a decision structure.
ANS: F
A nested decision structure can be used to test more than one condition.
ANS: T
Pseudocode could be logically incorrect if not properly indented.
ANS: F
In an expression with an OR operator, it does not matter which sub expression is true for the compound expression to be true.
ANS: T
A nested decision structure can achieve the same logic as a case structure.
ANS: T
The first line of the case structure starts with the word CASE followed by the test expression.
ANS: F
The If-Then-Else statement can be used to simplify a complex nested decision structure.
ANS: T
An If statement will produce unpredictable results if the programmer does not use proper indentations in pseudocode.
ANS: F
The If-Then-Else statement should be used to write a single alternative decision structure.
ANS: F
The short-circuit evaluation is performed with expressions containing any logical operators.
ANS: F

Chapter 5
Which structure causes a statement or set of statements to execute repeatedly?
Repetition
****
What type of loop uses a Boolean expression to control the number of times that it repeats a statement or set of statements?
Condition-controlled
****
Which pair of loops causes a statement or set of statements to repeat as long as a condition is true?
While and Do-While
****
Which loop repeats a statement or set of statements as long as the Boolean expression is false?
Do-Until
****
The statements that appear between the While and the End While clauses are called the ______.
Body of the loop
****
Which of these are posttest loops?
Do-While and Do-Until
****
In a count-controlled loop, the counter performs _______ action(s).
Three
****
Which loop statement does not contain an increment statement but automatically increments the counter at the end of each iteration?
For
****
The following is an example of what type of loop? For k = 7 To maxValue
Count-controlled
****
The ___ represents a special value that marks the end of a list of values.
Sentinel
****
Which loop is specifically designed to initialize, test, and increment a counter variable?
For
****
How many times will the following loop iterate?
For j = 1 To 5 Step 2 Display j
End For
(a) Three
****
How many times will the following loop iterate? Set k = 1 While k < = 5 Display k End While
Infinite
****
How many times will the following loop iterate? Set k = 1 While k > 5 Display k End While
No iterations
****
How many times will the following loop iterate? Set k = 1 Do Display k Set k = k + 1 Until k > 1
One

************
TRUE/FALSE
****
The conditions that control a loop repetition are Boolean expressions.
ANS: T

The While loop gets its name from the way it works: While a condition is false, do some task.
ANS: F

A While loop repeats infinitely when there is no statement inside the loop body that makes the test condition false.
ANS: T

The While and For loops are considered pretest loops because they test the condition before processing the statement(s) in the loop body.
ANS: T

A posttest loop does not perform any iteration if the Boolean expression is false to begin with.
ANS: F

A condition-controlled loop can be used to iterate the body of the loop a specific number of times.
ANS: T

In the For statement, you can only use positive integers as step values.
ANS: F

In a For loop, the programmer should know the exact number of iterations the loop must perform before writing the code.
ANS: F

Modules can be called from statements in the body of any loop.
ANS: T

The While loop is known as a pretest loop, which means it tests its condition before performing an iteration.
ANS: T
******
Chapter 6
******
The term ___ is used to describe any mechanism that accepts input, performs some operation that cannot be seen on the input, and produces output.
Black box
******
The function ____ specifies the return data type, name of the function, and the parameter variable(s).
Header
******
What term is used in the ending terminal symbol of a function flowchart?
Return
******
In the IPO chart, the ___ column describes the data that is passed to the function as arguments.
Input
******
The ___ function does the same thing as using the mathematical ^ operator. sqrt ****** Which function accepts two strings as arguments, returns "True" if the first string contains the second string, and otherwise returns "False"?
Contains
******
Which function returns a string within a string?
Substring
******
Which of the following errors occur when a real value is attempted to be assigned to an integer variable?
Type mismatch
******
Which of the following statements is true after the execution of the following statement? y = abs(x) y contains the absolute value of the value in x
******
The variable r would contain the value __ after the execution of the following statement.
Declare Integer i = 12
Declare Real r
Set r = toReal (i)
12.0
******
A ___ is a module that returns a value back to the part of the program that called it.
Function
******
Which of the following statements is true after the execution of the following statement?
All of the above
******
The function __ comprises one or more statements that are executed when the function is called.
Body
******
Examine the following piece of code and determine the data type of the function’s return value. Function Real sum (Integer num1, Integer num2) Declare Integer result Set result = num1 + num2 Return result End Function
Real
******
Examine the following piece of code and state the return value of the function. Function Integer product (Integer num1, Integer num2) Declare Real result Set result = num1 + num2 Return result End Function
Result
<><><><><><><><><><><><><><><><><><>
Library functions are built into the programming language, and can be called any time they are needed.
TRUE
The parameter list that accepts arguments is optional in a function definition.
TRUE
The input column in the IPO chart describes the process the function performs on the input data.
FALSE
Most programming languages let you assign an integer value to a real variable without causing an error.
TRUE
The library functions in every programming language have the same function names and accept the same arguments, but their behaviors might differ slightly.
FALSE
The number of arguments that can be passed to a function are limited in most programming languages.
FALSE
Programming languages have not yet started to support localization.
FALSE
Random numbers are useful in simulation programs where the computer must randomly decide how an object will behave.
TRUE
The function body follows the function header in a function definition.
TRUE
The toInteger function accepts a real number as its argument and preserves any fractional part in the returned number.
FALSE
<><><><><><><><><><><><><><><><><><>
1. What is the famous saying among computer programmers that refers to the fact that computers cannot tell the difference between good and bad data?
Garbage in, garbage out
2. The purpose of the __ is to get the first input value for the validation of a loop.
Priming read
3. Designing a program to avoid common errors is called __________ programming.
Defensive
4. ____ happens when an input operation attempts to read data, but there is no data to read.
Empty input
5. Input ____ is commonly done with a loop that iterates as long as an input variable contains bad data.
Validation
6. ____________ is sometimes the term used for input validation.
Error trap
7. In addition to using loops to validate data, ___ can also be used to validate data.
Boolean Function
8. Which of the following is not a check for data accuracy?
All of the above are checks for data accuracy
9. Which of the following is not an input validation error type?
All of the above are input validation error types
10. What is the first step to use in detecting data type mismatch errors?
Read the input as a string
11. The priming read is placed _________ the loop.
Before
12. Which of the following statements is true about this Boolean expression? score < 0 AND score > 100
This expression would never be true.
13. What type of function can be used to see if the password entered has the minimum number of characters?
String
14. If, when asked for a date of birth, the user enters a future date, this error should be caught by a _____ check.
Reasonableness
15. Accepting February 29 in only a leap year is a check that is done by a ___ check.
Date
<><><><><><><><><><><><><><><><><><>
TRUE/FALSE
1. An input validation loop is sometimes called an error handler.
TRUE

2. If the user provides bad data as input to a program, the program will correct the data and produce output.
FALSE

3. Programs should be designed such that all input is inspected before it is processed and bad data is discarded.
TRUE
4. The priming read is needed when a pretest loop is executed.
TRUE
5. Often a Boolean function can be used to validate data.
TRUE

6. The empty read is not an obvious input error and is a difficult one to handle.
FALSE
7. The practice of anticipating errors that can happen while a program is running and designing the program to avoid those errors is called defensive programming.
TRUE
8. Checking for accuracy of data, even when the user provides the right type of data, is part of input validation.
TRUE
9. Checking for reasonableness of data is programmatically impossible.
FALSE
10. When using string input validation it is wise to use the library function to convert the input to upper case or lowercase so case-sensitive string comparisons can be made.
TRUE

Similar Documents

Free Essay

Artificial Intelligence Overview

...artificial intelligence is, its drawbacks, and to what level computers have advanced in order to be able to achieve the goals of AI. In doing so, I will go on and discuss the following points: • Computers can only do what they are told by a programmer • Computers cannot think • Intelligence cannot be understood. There are many definitions of artificial intelligence (AI), but they all conclude in some form to say that it is the study of mental capabilities through the use of computer models. It can also be said that AI allows computers to carry out tasks that have been considered to require intelligence and are usually carried out by experts. The main advantages of AI are therefore that it can aid experts in decision making and comment on any statements made, helps answer the questions of trainees requiring the knowledge of experts in their field, and obviously, learn from its mistakes to acquire new facts. When defining artificial intelligence, it is useful to understand fully what both words mean. Something artificial is said to be unreal, unnatural and inorganic meaning it being synthetic. Intelligence is the skill of understanding and the ability to perceive and conceive meaning Therefore artificial intelligence is a way of providing man made computers with the ability to learn, perceive and think for themselves. This is just the theory, because in practice, many problems arise. Firstly, computers are pre-programmed using a set of simple rules and instructions...

Words: 1010 - Pages: 5

Free Essay

A Paper

... |Course Syllabus | | |Information Systems & Technology | | |PRG/211 Version 4 | | |Algorithms and Logic for Computer Programming | Copyright © 2012, 2011, 2010 by University of Phoenix. All rights reserved. Course Description This course provides students with a basic understanding of programming development practices. Concepts covered include the application of algorithms and logic to the design and development of procedural and object oriented computer programs to address the problem solving requirements associated with business information systems. This course will cover procedural programming concepts including data types, controls structures, functional decomposition, arrays, and files, classes and objects. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This...

Words: 1735 - Pages: 7

Premium Essay

Cpu Discription

...memory. The Central Processing Unit (CPU) Figure 2: The Central Processing Unit The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions. All computers, large and small, must have a central processing unit. As Figure 2 shows, the central processing unit consists of two parts: The control unit and the arithmetic/logic unit. Each part has a specific function. Before we discuss the control unit and the arithmetic/logic unit in detail, we need to consider data storage and its relationship to the central processing unit. Computers use two types of storage: Primary storage and secondary storage. The CPU interacts closely with primary storage, or main memory, referring to it for both instructions and data. For this reason this part of the reading will discuss memory in the context of the central processing unit. Technically, however, memory is not part of the CPU. Recall that a computer's memory holds data only temporarily, at the time the computer is executing a program. Secondary storage holds permanent or semi-permanent data on some external magnetic or optical medium. The diskettes and CD-ROM disks that you have seen with personal computers are secondary storage devices, as are hard disks. Since the physical attributes of secondary...

Words: 2592 - Pages: 11

Free Essay

Bios and Post

...Computer Structure and Logic Understanding The BIOS and POST Student Name Introduction Inside every PC is a BIOS, which stands for Basic Input Output System.  In a nutshell, BIOS is software that interacts between a computer’s hardware and the operating system and software applications.  There are several types of BIOS', ranging from the motherboard ROM BIOS to adapter BIOS' such as video BIOS, drive controller BIOS, network adapter BIOS, SCSI adapter BIOS, etc... These BIOS' are the lowest level of software in a computer providing a set of small programs or software routines that allow the hardware of a computer to interact with the operating system by a set standard. The Boot Process To get to the operating system, a computer must first boot from the BIOS.  The BIOS performs a number of tasks when a computer is started.  From initializing the microprocessor to initializing and testing hardware to starting the operating system.  Starting a computer is not a simple task.  It's a methodical process that is performed every time power is applied to a computer. This process will vary with different computers and different BIOS', but the overall goal is the same. When you first turn on a computer the very first operation performed by the CPU is to read the address space at FFFF:0000h. This address space is only 16 bytes, which is not nearly enough space to house the BIOS found on a motherboard.  Instead, this location contains...

Words: 1259 - Pages: 6

Free Essay

Artificial Intelligence

...history State of the Art Course overview • • • • • • • • • • • • • Intro to AI (chapter 1) Intelligent agents (chapter 2) Goal based agents and uninformed search(chapter 3.1-3.4) Informed Search : A* (chapter 3.5-3.6) Beyond classical search (chapter 4) Adversarial search alpha-beta pruning (chapter 5) Constraint satisfaction problem (chapter 6) Midterm 1 (chapter 1, 2, 3,4,5,6) Logical agents and propositional logic (chapter 7) First-order logic (chapter 8) Inference in first order logic (chapter 9) Midterm 2 (chapter 7, 8, 9) Quantifying uncertainty (chapter 13) Probabilistic reasoning using Bayes net (chapter 14) Probabilistic reasoning over time (chapter 15) Where is AI in Computer Science? Computer science : problem solving using computers • Computer Architecture and Operating System study how to build good computers. • Computation and Complexity Theory study what can be computed, what cannot be computed, i.e., the limits of different computing devices. • Programming Languages study how to use computers conveniently and efficiently. • Algorithms and Data Structures study how to solve popular computation problems efficiently. • Artificial Intelligence is relevant to any intellectual tasks, e.g., playing chess, proving mathematical theorems, writing poetry, driving a car on a crowded street, diagnosing diseases What is AI? A scientific and engineering discipline devoted to: • understanding principles that make intelligent ...

Words: 1948 - Pages: 8

Free Essay

Software

...JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. TECH (REAL TIME SYSTEMS) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel...

Words: 3183 - Pages: 13

Free Essay

Comp Txt

...1 2 Acknowledgements p.1 tr ©iStockphoto.com/Dennys Bisogno, etc t = top, b = bottom, l = left, r = right, c = centre Computer hardware and software brand names mentioned in this book are protected by their respective trademarks and are acknowledged. Scratch is developed by the Lifelong Kindergarten Group at the MIT Media Lab. See http://scratch.mit.edu Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia...

Words: 49691 - Pages: 199

Free Essay

Data Mining

...***Jong-Uk Choi *Department of Computer Science, University College London **Department of Computer Science, SungKyunKwan University *** Department of 888 , Sangmyung University e-mail: J.Kim@cs.ucl.ac.uk Fuzzy Darwinian Detection of Credit Card Fraud Peter J. Bentley, *Jungwon Kim, **Gil-Ho Jung and ***Jong-Uk Choi *Department of Computer Science, University College London **Department of Computer Science, SungKyunKwan University *** Department of 888 , Sangmyung University e-mail: J.Kim@cs.ucl.ac.uk 요 약 Credit evaluation is one of the most important and difficult tasks for credit card companies, mortgage companies, banks and other financial institutes. Incorrect credit judgement causes huge financial losses. This work describes the use of an evolutionary-fuzzy system capable of classifying suspicious and non-suspicious credit card transactions. The paper starts with the details of the system used in this work. A series of experiments are described, showing that the complete system is capable of attaining good accuracy and intelligibility levels for real data. 1. INTRODUCTION Fraud is a big problem today. Looking at credit card transactions alone, with millions of purchases every month, it is simply not humanly possible to check every one. And when many purchases are made with stolen credit cards, this inevitably results in losses of significant sums. The only viable solution to problems of this scale is automation by computer. Just as computers are used for credit scoring,...

Words: 3343 - Pages: 14

Free Essay

Nogotiation

...intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents"[1] where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success.[2] John McCarthy, who coined the term in 1955,[3] defines it as "the science and engineering of making intelligent machines."[4] AI research is highly technical and specialized, deeply divided into subfields that often fail to communicate with each other.[5] Some of the division is due to social and cultural factors: subfields have grown up around particular institutions and the work of individual researchers. AI research is also divided by several technical issues. There are subfields which are focussed on the solution of specific problems, on one of several possible approaches, on the use of widely differing tools and towards the accomplishment of particular applications. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.[6] General intelligence (or "strong AI") is still among the field's long term goals.[7] Currently popular approaches include statistical methods, computational intelligence and traditional symbolic AI. There are an enormous number of tools used in AI, including versions of search and mathematical optimization, logic, methods based on probability and economics...

Words: 7301 - Pages: 30

Free Essay

Selection Paper

...that structure. Examine any iteration control structure. If the program you described in Week Two does not lend itself well to the inclusion of a selection structure, create a new example of a selection structure. Create a Visual Logic flowchart that parallels this pseudocode. Test the flowchart to make sure that it executes properly and produces correct results. Submit the paper and the Visual Logic file. Format your paper consistent with APA guidelines. The process of selection is a way for the computer to interact with the user and to be able to understand how to make choices based on the user’s point of view or interest. Selection can be understood by computers by transforming such selections into algebraic equations, and from there into binary code which is the language that the computer understands, once the program is written, it will use a compilator, which acts as the translator between computer language and human language. The process of selection allows the user to choose what to do and then it gives options where to choose from, and it gives results which vary depending on the option selected by the user, when using the process of selection the options are limited by the options presented to the user, unlike the human brain computers can only handle certain number of options and the results will always be limited. There are several types of selections but some of the most important are: single, dual and multiple; each selection works in a different way and its...

Words: 554 - Pages: 3

Premium Essay

Programing Chapter 1

...can vary. An infinite loop is a flow of program logic that repeats and never ends. Software can be classified into two broad types System software and application software. Command line, a location on your computer screen at which you type text entries to communicate with the computer's operating system. The major difference between the two main programming styles in use today is programmer's focus during the earliest planning stages of a project. Graphical user interface(GUI) allows users to interact with a program in a graphical environment. The process of walking through a program's logic on paper before you actually write the program is called desk-checking.  Processing data items may involve organizing or sorting them,checking them for accuracy, or performing calculations with them. Every programming language has rules governing its word usage and punctuation. Using Pseudocode involves writing down all the steps you will use in a program. Before a programmer plans the logic of the program, he or she must understand the problem. F Software can be classified into two broad types: application software and programming software.  T Every programming language has rules governing its word usage and punctuation.  T Besides the popular, comprehensive programming languages such as Java and C++, many programmers use scripting languages such as Python, Lua, Perl, and PHP.  F Professional computer programmers write programs to satisfy their own needs...

Words: 1631 - Pages: 7

Premium Essay

Assignment

...client-based networks, the client computer does most of the work; the server is used only for data storage. In client-server networks, the work is shared between the servers and clients. The client performs all presentation logic, the server handles all data storage and data access logic, and one performs the application logic. Client server networks can be cheaper to install and often better balance the network loads but are far more complex and costly to develop manage. 2. Describe the four basic functions of an application software package. Basic functions of an application Layer Data storage Storing of data generated by programs (e.g., files, records) Data access logic Processing required accessing stored data (e.g., SQL) Application logic Business login such as word processors, spreadsheets Presentation logic Presentation of info to user and acceptance of user commands 7. Compare and contrast two-tier, three-tier, and n-tier client-server architectures. What are the technical differences, and what advantages and disadvantages does each offer? Two-tier client server architecture uses only two sets of computers, one set of clients and one set of servers. Three-tier architecture uses three sets of computers. In this case, the software on the client computer is responsible for presentation logic, an application server is responsible for the application logic, and a separate database server...

Words: 1140 - Pages: 5

Premium Essay

Problems

...programmers write computer programs to provide solutions for others. First, the programmer must understand the problem he/she is trying to solve. All aspects of the problem description must be clarified and completely understood at this stage. Planning the Logic: Once the programmer understands the problem, it is time to plan the logic of the program. During this time of the process, the programmer uses tools to layout the program’s logical steps from beginning to end. The programmer decides the variables needed in the program. Also, the programmer uses planning tools like, Flowcharts, and Pseudocode to show the steps involved in his/her programming solution. Coding the Program: Coding is converting the design into an actual program, written in some form of programming language. This is the step where you actually have to sit down at the computer and type. Coding is a little bit like writing an essay. In most cases you write your program using something like a word processor. And, like essays, there are certain things that you always need to include in your program, like titles, contents pages etc.. When you've finished translating your design into a program you need to submit it to the computer to see what it makes of it. Using Software to Translate the Program into Machine Language: The lowest-level programming language (except for computers that utilize programmable microcode) Machine languages are the only languages understood by computers. While easily understood...

Words: 511 - Pages: 3

Free Essay

Documentation Techniques

...------------------------------------------------- Documentation Techniques Five documentation techniques include data flow diagrams, entity relationship diagrams, system flowcharts, program flowcharts, and record layout diagrams. Data Flow Diagrams and Entity Relationship Diagrams * Data flow diagrams – Data flow diagrams (DFD) use symbols to represent the entities, processes, data flows, and data stores that pertain to a system. * Entities – Entities in a DFD are objects that lie at the boundary of the system being modeled. They are the sources of and destinations for data and can be other interfacing systems or entities external to the organization. Entities are labeled as singular nouns on a DFD. Data stores represent the accounting files and records used in each process, and the labeled arrows represent data flows between processes, data stores, and entities. * Processes – Processes are labeled with a descriptive verb. Process objects should not be represented as nouns. The arrows connecting objects should be labeled to represent specific flows of data. Also, each data flow label should be unique. The same label should not be attached to two different flow lines in the same DFD. * Usage – Systems analysts use DFDs extensively to represent the logical elements of the system. It does not depict the physical system. * Entity relationship diagrams – An entity relationship diagram is used to represent the relationship between business...

Words: 735 - Pages: 3

Free Essay

Education

...Computer Architecture Lecture 1: Digital logic circuits The digital computer is a digital system that performs various computational tasks. Digital computers use the binary number system, which has two digits: 0 and 1. A binary digit is called a bit. A computer system is sometimes subdivided into two functional entities: hardware and software. The hardware of the computer consists of all the electronic components and electromechanical devices that comprise the physical entity of the device. Computer software consists of the instructions and data that the computer manipulates to perform various data-processing tasks. Program A sequence of instructions for the computer is called a program. The data that are manipulated by the program constitute the data base. Computer organization is concerned with the way the hardware components operate and the way they are connected together to form the computer system. The various components are assumed to be in place and the task is to investigate the organizational structure to verify that the computer parts operate as intended. Computer design is concerned with the hardware design of the computer. Once the computer specifications are formulated, it is the task of the designer to develop hardware for the system. Computer design is concerned with the determination of what hardware should be used and how the parts should be connected. This aspect of computer hardware is sometimes referred to as computer implementation. Computer architecture...

Words: 9034 - Pages: 37