CORRECT ANSWERS!!
1 of 49
Term
How many bits are used in the current ASCII scheme?
Give this one a try later!
(PII) Personally identifiable data like ASCII uses 8 bits
birthday and Social security (to produce 256 glyphs)
Principles Missing quotes
Policies Missing values
, Regulatio Capitals / lowercase of
ns Laws commands are not aligned
Don't know?
2 of 49
Term
Why was ASCII developed?
Give this one a try later!
Someone that establishes policies and direction for the overall
security and privacy of all university data, particularly highly
sensitive data within the respective areas of responsibility
The benefits of developing your own program gives you the ability
to integrate hands-on activities with a wide range of technology
applications, without paying high cost software site licensing fees
These policies apply to all academic and operational departments
and offices at all George Mason University locations, owned and
leased. The policies and
procedures provided herein apply to all University faculty, staff,
students, visitors and contractors.
the American Standard Code for Information Interchange, was
released to serve as a common language among computers.
The idea was that 128 characters—letters, numbers, punctuation
marks, and control codes—would each have a standard numeric
value
, Don't know?
3 of 49
Term
What is the difference between a computational scientist
and a computer Scientist?
Give this one a try later!
A pledge to not plagiarize, cheat, lie or steal information
Arithmetic operators follow the same precedence rules as in
mathematics, and these are: exponentiation is performed first (when
available), multiplication and division are performed next, addition
and subtraction are performed last.
--(PEMDAS)
A Computer scientist is related to computer hardware and software
technology
a computational scientist is related to science research using
computation/simulation.
(2^n -1) = WHAT IS THE LARGEST BASE 10 INTEGER THAT CAN BE REPRESENTED
Don't know?
4 of 49
, Term
What is a type of violation that can occur at university and
its course of action?
Give this one a try later!
If you fail to attend classes, If you miss deadlines, you can
you can lose your financial aid be expelled from the university
If you violate the
If you violate the dress
responsible use of
code, you can be suspended
computing policy then you
can be banned from lab
computers
Don't know?
5 of 49
Term
What is integer division?
Give this one a try later!
Someone that establishes policies and direction for the overall
security and privacy of all university data, particularly highly
sensitive data within the respective areas of responsibility