Friday, May 6, 2011

chapter 1

Most commercial software applications are large and complex and are usually developed by a single individual.

===false

RAM is usually
== A volatile type of memory, used only for temporary storage

A byte is a collection of
=Eight bits

The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read.
== true

An operating system can be categorized according to
==The number of users they can accommodate

Another term for programs is
==Software

In the Programming Process which of the following is not involved in defining what the program is to do
=Compile code

Colons are used to indicate the end of a Java statement.
=false

This is a cross between human language and a programming language.
==Pseudocode

The contents of a variable cannot be changed while the program is running.
=== false

Byte code instructions are
==Read and interpreted by the JVM

Suppose you are at an operating system command line, and you are going to use the following command to compile a program:
==Make sure you are in the same directory or folder where the MyClass.java file is located


Internally, the central processing unit (CPU) consists of two parts
===The control unit and the arithmetic and logic unit ALU

Which of the following will run the compiled program ReadIt?
==java ReadIt

Which of the following commands will compile a program named ReadIt?
=javac ReadIt.java

The major components of a typical computer system consist of
==All of the above

The original name for Java was
==Oak

The Java Virtual Machine is a program that reads Java byte code instructions and executes them as they are read
==True

A characteristic of ________ is that only an object's methods are able to directly access and make the changes to the object's data.
==Data hiding

Compiled byte code is also called source code.
== false

Software refers to
==Programs

The data contained in an object is known as ________.
==Attributes

Application software refers to
==The programs that make the computer useful to the user

When an object's internal data is hidden from outside code and access to that data is restricted to the object's methods, the data is protected from accidental corruption.
==true

No comments:

Post a Comment