Genius

COM/204 COM204 COM 204 Chapter 7 Programming Logic and Design, PART 1

COM 204 Chapter 7 Programming Logic and Design, PART 1

Programming Logic and Design, 8th Edition

Chapter 7

Review Questions
1.	Random access memory is _____.
a.	volatile 
b.	 permanent
c.	persistent
d.	continual
2.	Which is true of text files?
a.	Text files contain data that can be read in a text editor.
b.	Text files commonly contain images and music.
c.	both of the above
d.	none of the above
3.	Every file on a storage device has a _____.
a.	name
b.	size
c.	both of the above
d.	none of the above
4.	Which of the following is true regarding the data hierarchy?
a.	 Fields contain records.
b.	Characters contain fields.
c.	Fields contain files.
d.	Files contain records.
5.	The process of _____ a file locates it on a storage device and associates a variable name within your program with the file.
a.	declaring 
b.	closing
c.	 opening
d.	defining
6.	When you write to a file, you _____.
a.	move data from a storage device to memory
b.	copy data from a storage device to memory
c.	move data from memory to a storage device
d.	copy data from memory to a storage device
7.	Unlike when you print a report or display information on a screen, when a program- output is a data file, you do not _____.
a.	include explanations or formatting such as dollar signs
b.	open tor close he files
c.	output all of the input fields
d.	all of the above
8.	When you close a file, it _____.
a. becomes associated with an internal identifier
b. cannot be reopened
c.  is no longer available to the program
d. ceases to exist
9.	A file in which records are stored one after another in order based on the contents of a field is a(n) _____ file.
a.	temporal
b.	alphabetical
c.	random
d.	 sequential
10.	When you combine two or more sorted files while maintaining their sequential order based on a field, you are _____ the files.
a.	tracking
b.	collating
c.	merging
d.	absorbing
11.	A control break occurs when a program _____.
a.	pauses to perform special processing based on the value of a field
b.	ends prematurely, before all records have been processed
c.	 takes one of two alternate courses of action for every record
d.	passes logical control to a module contained within another program
12.	Which of the following is an example of a control break report?
a.	a list of all customers of a business in zip code order, with a count of the number of customers who reside in each zip code
b.	a list of all students in a school, arranged in alphabetical order, with a total count at the end of the report
c.	a list of all employees in a company, with a “Retain” or “Dismiss” message following each employee record
d.	a list of medical clinic patients who have not seen a doctor for at least two years
13.	A control break field _____.
a.	always is output prior to any group of records on a control break report
b.	always is output after any group of records on a control break report
c.	never is output on a report
d.	causes special processing to occur
14.	Whenever a control break occurs during record processing in any control break program, you must _____.
a.	declare a control break field
b.	set the control break field to 0
c.	update the value in the control break field
d.	output the control break field
15.	Assume that you are writing a program to merge two files named FallStudents and SpringStudents. Each file contains a list of students enrolled in a programming logic course during the semester indicated, and each file is sorted in student ID number order. After the program compares two records and subsequently writes a Fall student to output, the next step is to _____.
a.	read a SpringStudents record
b.	read a FallStudents record
c.	write a SpringStudents record
d.	write another FallStudents record
16.	When you merge records from two or more sequential files, the usual case is that the records in the files _____.
a.	contain the same data
b.	have the same format
c.	are identical in number
d.	are sorted on different fields
17.	A file that holds more permanent data than a transaction file is a _____ file.
a.	master
b.	primary
c.	key
d.	mega-
18.	A transaction file is often used to _____ another file.
a.	augment
b.	remove
c.	verify
d.	update
19.	The saved version of a file that does not contain the most recently applied transactions is known as a _____ file.
a.	master
b.	child
c.	parent
d.	relative
20.	Random access files are used most frequently in all of the following except _____.
a.	interactive programs
b.	batch processing
c.	real-time applications
d.	programs requiring direct access

Answered
Other / Other
28 Oct 2016

Answers (1)

  1. Genius

    COM/204 COM204 COM 204 Chapter 7 Programming Logic and Design, PART 1

    1. Random access memory is ____ ****** ******
    To see full answer buy this answer.
    Answer Attachments

    1 attachments —

    • img
      part_1448136.docx

Report As Dispute

Share Your Feedback

Give Review : A+ A B C D F